Learning programming has become a headache for many. There are those late nights when I look up at the bright moon, wondering when I can fully grasp assembly language and fulfill my dreams.
But reality always hits hard….
There are many moments when I feel like smashing my keyboard, but we, the brave, will not waste our time like that. Can we learn by smashing the keyboard? No, we can learn by watching the snow.
If you want to learn more about assembly language and binary vulnerabilities, don’t miss out on the high-quality courses from Kanxue—
“In-Depth Guide to Assembly Language and Binary Vulnerabilities
This course has nearly 3000 students; let’s explore it together!
Instructor Introduction
Skills: C/C++, Python, Assembly
Special Skills: Software Debugging, Reverse Engineering
Additional Skills: Teaching
Course Introduction
This course mainly explains assembly language under the Windows system and knowledge of the Windows system. The main content is x86 assembly, with x64 and 16-bit assembly as supplementary content. It provides an in-depth understanding of the transition from real mode to protected mode. You will learn about the structure of executable files under Windows. Finally, we will discuss techniques for writing shellcode under Windows using assembly, laying a foundation for further security studies.
Course Details
Chapter 1: Basic Knowledge
1.1 Preface and Environment Configuration
1.2 Number Systems and Conversions
Chapter 2: Preliminary Understanding of x86 Processor Architecture
2.1 Overview of this Chapter and General Architecture Concepts
2.2 32-bit x86 Processor
2.3 64-bit x86-64 Processor
2.4 John von Neumann
Chapter 3: Basic Syntax of Assembly Language
3.1 Seven Addressing Modes
Appendix: Experimental Environment
Preview
Experimental Environment v1.0
Appendix: Vulnerability Debugging
01. Stack Overflow Experiment – Nearby Variable Overwrite
02. Stack Overflow Experiment – Using Overwrite to Control Program Execution Flow
03. Stack Overflow Experiment – Initial Exploration of Shellcode
04. Stack Overflow Experiment – Introducing Jump Techniques
05. Shellcode Development Techniques in VS Environment – Environment Configuration
06. Shellcode Development Techniques in VS Environment – Eliminating Absolute Address Dependence
……
– End –
Topic Solicitation is in Full Swing!
(The qualifying round Q1 will start on March 10, stay tuned!)
Official Account ID: ikanxue
Official Weibo: Kanxue Security
Business Cooperation: [email protected]
Click to read the original text and learn for free~