Have you ever found yourself staring at a vulnerability advisory with some proof-of-concept snippets and wished the author had rather attached a working exploit with it? Have you wished you could analyze vulnerabilities and write your own exploits for them? Have you wanted to debug and exploit custom built applications and binaries?
Now in its third year, the Exploit Laboratory brings you an action packed teaching you the art of vulnerability analysis and exploitation from the ground up. The Exploit Laboratory starts off with a basic insight into system architecture, process execution, operating systems and error conditions. The class then quickly accelerates to analysing vulnerabilities with debuggers, reproducing reliable error conditions and writing working exploits for the same.
The Exploit Laboratory features popular third party applications and products as candidates for vulnerability analysis and exploitation, rather than building up on carefully simulated lab exercises. Most of the class time is spent working on lab exercises and examples.
Lab examples and exercises used in this class cover both the Unix (Linux) and Microsoft Windows platforms, illustrating various error conditions such as stack overflows, heap overflows and format string bugs (time permitting). The latter part of the class focuses on topics such as bypassing protection mechanisms, multi-stage payloads, integrating your own exploits into frameworks such as Metasploit, etc. All this - delivered in a down-to-earth, learn-by-example methodology, by trainers who have been teaching advanced topics in computer security for over 9 years.
This class is updated from the 2008 edition, featuring new content on heap overflows, abusing exception handlers and more hands-on examples based on recent vulnerabilities. The class features Mac OS X exploitation, for the first time.
This class does NOT require knowledge of assembly language. A few concepts and a sharp mind is all you need.
ATTENZIONE: IL WORKSHOP è A PAGAMENTO, PER MAGGIORI INFORMAZIONI CLICCA QUI