Reverse

Offensive Linux development Intermediate - 5 days

Description

This training aims at understanding the foundations of the Linux operating system in order to implement offensive security mechanisms through low-level C APIs.

After a first day of refresher on the basics of the Linux operating system, participants will learn to handle low-level APIs linked to processes (creation, communication, injection, debugging). They will also discover the ELF format and its representation in memory. Finally, security mechanisms (LSM), isolation (cgroup, namespaces) and system auditing mechanisms will also be discussed.

During this training, the participants will be required to implement a scenario in which an attacker will inject a library into the sshd service in order to intercept and then exfiltrate user passwords, while ensuring persistence on the system by installing a backdoor in a shared library.

  • 5 days (35 hours)

  • 13h theoretical courses / 22h practical labs

Public and prerequisites

This training is an advanced level course designed for pentesters, Linux developers, and security teams.

  • Pentesters

  • Linux developers

  • Security teams

Good knowledge of C development as well as a good general knowledge of security are recommended.

Content

Day 1

Linux OS basics: setup of the work environment, Linux distributions, shells, file system, security model, compilation chain, Systemd, D-Bus and PAM.

Day 2

ELF format, memory representation and hooking techniques.

Day 3

Processes, threads and injection: process creation, termination, monitoring, API, debugging and injection.

Day 4

Inter-Process Communication : IPC System V, signals, sockets.

Day 5

Security and isolation mechanisms: LSM (Apparmor & SELinux), Cgroups, Namespaces. User / kernel interface.