Featured resource
2026 Tech Forecast
2026 Tech Forecast

Stay ahead of what’s next in tech with predictions from 1,500+ business leaders, insiders, and Pluralsight Authors.

Get these insights
  • Course

Resource Development with GDB

Unlock the power of GDB in red team operations. In this course, you'll learn MITRE's resource development tactics using the GDB debugger.

Intermediate
17m
(4)

Created by Christopher Curry

Last Updated Jul 31, 2025

Course Thumbnail
  • Course

Resource Development with GDB

Unlock the power of GDB in red team operations. In this course, you'll learn MITRE's resource development tactics using the GDB debugger.

Intermediate
17m
(4)

Created by Christopher Curry

Last Updated Jul 31, 2025

Get started today

Access this course and other top-rated tech content with one of our business plans.

Try this course for free

Access this course and other top-rated tech content with one of our individual plans.

This course is included in the libraries shown below:

  • Security
What you'll learn

Complex software systems often contain vulnerabilities that can be exploited for malicious purposes. In this course, Resource Development with GDB, you’ll cover how to utilize the GNU Debugger (GDB) to execute resource development techniques in a red team environment. First, you’ll demonstrate how to identify and exploit a buffer overflow vulnerability. Next, you’ll apply GDB to analyze and bypass a software protection mechanism. Finally, you’ll simulate a scenario where these techniques are used to develop effective attack vectors. When you’re finished with this course, you’ll have the skills and knowledge to execute these techniques T1588.002 (Obtain Capabilities: Tool), T1587.001 (Develop Capabilities: Malware) and T1587.004 (Develop Capabilities: Exploit) using GDB. More importantly, knowing how these techniques can be used against you, will ultimately lend to your ability as an organization, or an individual, to detect and defend against specific attack vectors.

Resource Development with GDB
Intermediate
17m
(4)
Table of contents

About the author
Christopher Curry - Pluralsight course - Resource Development with GDB
Christopher Curry
1 courses 0.0 author rating 0 ratings

Christopher Curry is a full-time offensive security engineer working as a government vendor and a part time Air Force Cyber Officer. He specializes in offensive cyber capability development, vulnerability research, red team engagements, and building Software Defined Radio applications. He has professional performed all phases and roles of offensive cyberspace operations.

Get started with Pluralsight