In this 5 day course, students will learn how to exploit 32-bit stack-based buffer overflows in Linux and Windows applications without the presence of strong mitigations.
Specifically, students will:
- Learn about the process of vulnerability discovery.
- Learn how to develop x86 assembly and shellcode.
- Learn how the stack works on the x86 architecture.
- Exploit classic stack-based buffer overflows on Linux and Windows.
- Exploit Linux stack-based buffer overflows on NX/DEP using ret2libc techniques.
- Defeat ASLR on Linux.
- Exploit Windows stack-based buffer overflows using SEH.
- Defeat NX/DEP using ROP on Linux and Windows.
- Use Windows and Linux debuggers including GDB and Immunity.
For costing and a printable course outline click here.
Prerequisites: Proficiency in general programming. Some competency in Python.
Format: Lectures and Labs.
Time: 9am – 5pm.
Duration: 5 days.