Overview
This class is targeted for those looking to move beyond “Hacking Exposed” level skills to the next level. This class starts off slow by providing a foundation of programming survival skills of C and assembly. Next, the course moves to processor and memory structure before moving into Linux exploits and Windows Exploits. Finally, automated tools are introduced to speed up the exploit development process.
The class will cover a variety of topics to include: programming, buffer overflows, heap overflows, format string errors, exploiting techniques on Windows and Linux, debugging skills and the latest automation tools. Using this building block approach, the student will gain a working understanding of vulnerabilities, how to prevent them, and how to develop proof of concept exploits from a typical vulnerability alert. This is a hands-on course with half the time spent working through lab examples and real world vulnerabilities.
What You Will Learn:
What You Will Get
Students will be presented with the following materials to be used and referenced throughout the duration of the course:
Copy of all slides, one bootable CDROM (Linux), and one CDROM with tools, code examples, etc.
Who Should Take the Course
Pen-testers, security researchers, security professionals looking to move beyond “Hacking Exposed” skills, security students, programmers looking to learn about security implications, technical managers looking to gain a deeper understanding of what hackers are up to.
Prerequisites
Student should have a basic understanding of:
Course Length: Two days. All course materials, lunch and two coffee breaks will be provided. A Certificate of Completion will be offered. You must provide your own laptop.
Early:
Ends January 1 |
Regular: |
Late/Onsite: |
1600 EUR |
1700 EUR |
1850 EUR |