Exploit Writing

The course is focused on a comprehensive coverage of software exploitation. It will present different domains of code exploitation and how they can be used together to test the security of an application. The participants will learn about different types and techniques of exploitation, using debuggers to create their own exploits, understand protection mechanism of the Operating Systems and how to bypass them. The course is heavily focused on being hands-on. Reference material documents will be provided for concepts for further reading. Course content slides will demonstrate attacks performed in-class and explain concepts where needed.

Introduction to Exploit Writing

Programming and Basic

Assembely Language

Debugging

Stack Based Buffer Overflow

Understanding Windows Shellcode

Fuzzers

Heap Based Overflow

Exploiting Safe SEH Protected Programs

Denial Of Service

Bypassing DEP and ASLR

Advance Shellcoding (Win32 Egghunting

Connect-back

Staged

Alphanumeric)

Encoders and Writing Custom Encoders

DLL Hijacking

Client Side Exploits

From Vulnerability to Exploit

Metasploit Framework

Binary payloads and Antivirus Evasion

Exploit to Metaploit

Be the first to add a review.

Please, login to leave a review
Add to Wishlist
Enrolled: 45435 students
Duration: 1 Month
Lectures: 0
Level: Advanced