In-Depth Guide to Assembly Language and Binary Vulnerabilities

In-Depth Guide to Assembly Language and Binary Vulnerabilities

I don’t know when it started, but learning programming has become a headache. On those late nights, I look up at the bright moon and wonder when I can fully grasp assembly language, becoming the dream of countless girls.

But reality always slaps you in the face….

There are many moments when I feel like smashing the keyboard, but we heroes will never waste time like that; can we learn just by smashing the keyboard? No, we can learn by watching Xue.

If you want to learn more about assembly language and binary vulnerabilities, don’t miss the excellent courses on Xue——

In-Depth Guide to Assembly Language and Binary Vulnerabilities

This course, which has nearly 3000 students, let’s take a look together~!In-Depth Guide to Assembly Language and Binary Vulnerabilities

In-Depth Guide to Assembly Language and Binary Vulnerabilities

Instructor Introduction

In-Depth Guide to Assembly Language and Binary Vulnerabilities

Personal Skills: C/C++, Python, Assembly

Special Skills: Software Debugging, Reverse Engineering

Additional Skills: Teaching

Course Introduction

This course mainly explains assembly language and Windows system knowledge under the Windows system. It uses x86 assembly as the main content, with x64 and 16-bit assembly as supplementary content. It deeply understands the transition from real mode to protected mode. Learn the structure of executable files under Windows. Finally, it explains the techniques of writing shellcode under Windows using assembly, laying the foundation for future security learning.

Course Details

Chapter 1: Basic Knowledge

1.1 Preface and Environment Configuration

1.2 Number Systems and Base Conversion

Chapter 2: Preliminary Understanding of x86 Processor Architecture

2.1 Overview of this Chapter and General Architecture Concepts

2.2 32-bit x86 Processor

2.3 64-bit x86-64 Processor

2.4 John von Neumann

Chapter 3: Basic Syntax of Assembly Language

3.1 Seven Addressing Modes

Appendix: Experimental Environment

Preview

Experimental Environment v1.0

Appendix: Vulnerability Debugging

01. Stack Overflow Experiment – Nearby Variable Flooding

02. Stack Overflow Experiment – Using Flooding to Control Program Execution Flow

03. Stack Overflow Experiment – Initial Exploration of Shellcode

04. Stack Overflow Experiment – Introducing Jumping Board Technology

05. Shellcode Development Techniques in VS Environment – Environment Configuration

06. Shellcode Development Techniques in VS Environment – Eliminating Dependency on Absolute Addresses

……

How to Become a Kanxue Instructor?1) Fill out the application information and submit it to https://www.kanxue.com/user-online_sendmsg.htm 2) Application Format: 1) Applicant Forum Nickname 2) Name 3) Phone 4) WeChat/QQ Number 5) Work Unit/School 6) Field/Specialty 7) Position 8) Desired Course Topic or Direction 9) Areas of Expertise 10) Personal Introduction/Resume For more details, click Kanxue Academy Recruitment for Kanxue Instructors

In-Depth Guide to Assembly Language and Binary VulnerabilitiesClick Read Original to learn for free~

Leave a Comment