
- Tailored for beginners
- Includes study materials such as videos and PDF slides
- Covers the fundamentals of exploit development
- Provides an in-depth understanding of stack exploitation
- Ideal for anyone looking to jump-start their journey into exploit development
The course contents are divided into 2 modules listed below:
Linux Exploit Development
- Anatomy of buffer overflows in Linux applications.
- Exploiting stack-based buffer overflows on Linux.
- Using ret2libc, Return-Oriented Programming (ROP) to bypass security mechanisms (NX bit).
- Bypass Address Space Layout Randomization (ASLR)
- Both real world examples & simulated examples
- Using GDB for debugging
Win32 Exploit Development
- Practical exploration of Windows elements such as processes, PE files, and threads.
- Shedding light on win32 SEH (Structured Exception Handling).
- Understanding the exploitation of SEH.
- Discussion on various ASLR bypass techniques.
- Hands-on experience with different debuggers and disassemblers.