Skip to content

Commit 276f386

Browse files
author
citypw
authored
Merge pull request #1 from Sn0rt/fix_readme
update: fix readme and append a chinese version.
2 parents cf072c4 + 3e2b6e0 commit 276f386

File tree

2 files changed

+74
-12
lines changed

2 files changed

+74
-12
lines changed

README-zh.md

Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
# linux exploit development tutorial
2+
3+
## 这是什么?
4+
5+
这是面向新手的 linux exploit 开发指南.
6+
7+
测试机器是 ubuntu 14.04 的默认安装.
8+
9+
*其他语言阅读 readme: [English](README.md), [简体中文](README-zh.md).*
10+
11+
## 如何组织的?
12+
13+
### 第一章节: 基础至少
14+
15+
基础部分知识比如: 栈与堆分别是什么? c 语言如何转换成汇编? 内存布局是什么样的? ...
16+
17+
基础的安全知识如: 什么是堆栈溢出? 堆分配器是如何工作的?...
18+
19+
### 第二章节: 栈的安全
20+
21+
主要关注在现代 linux 上栈的安全防护机制及其绕过的常规套路.
22+
23+
### 第三章节: 堆的安全
24+
25+
主要关注在现代 linux 上 glibc 下堆的安全防护机制及其绕过的常规套路.
26+
27+
### 第四章节: 内核的安全
28+
29+
主要关注在现代 linux (2.6.32)及其以后版本的内核本身的安全机制与内核提供给用户态的安全机制.
30+
31+
### 第五章节: 漏洞发现
32+
33+
(WIP)
34+
35+
这个章节对我来说目前也是一个新领域.
36+
37+
## 如何修改和更新 ?
38+
39+
```shell
40+
sudo dnf install texlive-\* -y
41+
git clone [email protected]:hardenedlinux/linux_exploit_development_tutorial.git
42+
cd linux_exploit_development_tutorial
43+
make # preview
44+
```
45+
46+
## 如何实践文档代码 ?
47+
48+
(WIP)
49+
50+
源代码会陆续放到`lab-code`目录中,其实更倾向于提供一个虚拟机镜像供下载.
51+
52+
...
53+
54+
## 版权
55+
56+
这个项目是以 <a href="http://creativecommons.org/licenses/by-sa/3.0/" target="_blank">知识共享署名-相同方式共享 3.0</a> 许可协议授权.

README.md

Lines changed: 18 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,34 +1,40 @@
11
# linux exploit development tutorial
22

3-
## what's this ?
3+
## What's this ?
44

55
A series tutorial for linux exploit development to newbie.
66

7-
## how to organize ?
7+
The test machine is ubuntu 14.04 which was default install.
8+
9+
*Read this in other languages: [English](README.md), [简体中文](README-zh.md).*
10+
11+
## How to organize ?
812

913
### chapter 1: Basic knowledge
1014

1115
base knowledge like : what's stack and heap ? how convert c language to assembly language ? what's elf and memroy layout? etc..
16+
1217
base vulnerability problems like : what's is overflow and memory corruption ? how heap working ? etc...
1318

1419
### chapter 2: Stack security
1520

16-
we focus userspace stack security mechanism and bypass.
21+
this chapter focus userspace stack security mechanism and bypass.
1722

1823
### chapter 3: Heap security
1924

20-
we focus userspace heap(ptmalloc2 of glibc) security mechanism and bypass.
25+
this chapter focus the security mechanism of heap in modern linux.
2126

2227
### chapter 4: Kernel security
2328

24-
we focus kernel security mechanism for self and userland.
25-
WIP...
29+
this chapter focus the mechanism security of modern linux kernel (2.6.32) and later
2630

2731
### chapter 5: Vulnerability discovery
2832

29-
WIP...
33+
(WIP)
3034

31-
## how to modify and update ?
35+
this chapter is a new filed to me.
36+
37+
## How to modify and update ?
3238

3339
```shell
3440
sudo dnf install texlive-\* -y
@@ -37,12 +43,12 @@ cd linux_exploit_development_tutorial
3743
make # preview
3844
```
3945

40-
## how to hand on ?
46+
## How to hand on ?
4147

42-
some source code in `lab-code`.
48+
(WIP)
4349

44-
WIP...
50+
some source code in `lab-code`.
4551

4652
## copyleft
4753

48-
CC-BY-NC-SA 4.0 Unported
54+
This work is licensed under the <a href="http://creativecommons.org/licenses/by-sa/3.0/" target="_blank">Creative Commons Attribution-ShareAlike 3.0 Unported License</a>

0 commit comments

Comments
 (0)