$4,000

Exploit Development

Event Information

Share this event

Date and Time

Location

Location

InfoSect

U2 / 9 Beaconsfield Street

Fyshwick, ACT 2609

Australia

View Map

Event description

Description

In this 5 day course, students will learn how to exploit 32-bit stack-based buffer overflows in Linux and Windows applications without the presence of strong mitigations.

Specifically, students will:

  1. Learn about the process of vulnerability discovery.
  2. Learn how to develop x86 assembly and shellcode.
  3. Learn how the stack works on the x86 architecture.
  4. Exploit classic stack-based buffer overflows on Linux and Windows.
  5. Exploit Linux stack-based buffer overflows on NX/DEP using ret2libc techniques.
  6. Defeat ASLR on Linux.
  7. Exploit Windows stack-based buffer overflows using SEH.
  8. Defeat NX/DEP using ROP on Linux and Windows.
  9. Use Windows and Linux debuggers including GDB and Immunity.

Format: Lectures and Labs

Time: 9am – 5pm, Monday-Friday.
Catering provided.

Prerequisites: Proficiency in general programming. Some competency in Python.

Courses have no more than 8 people.

A minimum of 4 registrations are required for course to run. If less than 4 registrations are received, InfoSect will be in contact about refunding or rescheduling the course.

Share with friends

Date and Time

Location

InfoSect

U2 / 9 Beaconsfield Street

Fyshwick, ACT 2609

Australia

View Map

Save This Event

Event Saved