Exploit Development

Click Here to Fill the Enquiry Form

Course No: IS0093
This course builds the skills required to reverse engineer 32-bit and 64-bit applications, perform remote user application and kernel debugging, engineer 0-day exploits, analyze patches for 1-day exploits, and write complex exploits against modern software and operating systems.
This  course will be useful for almost computer engineers having basic knowledge of will anyway keep them aware with secure strategy irrespective of being in testing or in development. Specifically this program will be helpful to following genre of people:

  • Network/System Administrators
  • Penetration Testers
  • Exploit Researchers/Developers
  • Aspirant Engineering Bachelors
We have some pre-requisite for this course. These are not mandatory but having them will certainly be a benefit for you.

  • Basic knowledge of OSI model, Operating System
  • Basic Ethical Hacking Course
  • Network Security Course
  • Web Application Security Course
Threat Modeling, Reversing and Debugging with IDA

  • Secure SDLC
  • IDA & IDA Pluggins
  • Local application debugging with IDA
  • emote application debugging with IDA

Patch Diffing, 1-Day Exploits, and Return Oriented Shellcode

  • Patch management process
  • patch extraction and Binary diffing with BinDiff, patchdiff2, turbodiff, and darungrim3
  • Visualizing code changes and identifying fixes
  • Triggering patched vulnerabilities
  • Reversing 32-bit and 64-bit applications and modules
  • Writing one-day exploits
  • modern exploit mitigation controls

Windows Kernel Debugging and Exploitation

  • Windows Kernel
  • Kernel protections
  • Debugging Windows Kernel
  • WinDbg
  • Kernel Vulnerabilities
  • Kernel Exploitations
Windows browser and client-side exploitation

  • Windows heap management, constructs, and environment
  • Browser-based and client-side exploitation
  • Heap spray
  • C++ vftable/vtable
  • Use-After-Free attacks
  • Dangling pointers
  • Defeating ASLR, DEP, and other exploit mitigation controls

Linux Exploitaiton

  • Linux heap management, constructs, and environment
  • Abusing macros: unlink() and frontlink()
  • Overwriting Function pointer
  • Format string exploitation
  • Exploiting Doubly-linked lists
  • Breaking Linux exploit mitigation controls
  • Threat Modeling
  • Using IDA for or Application exploitation.

Exploitation Exercises


DLP

$225

₹ 12,100
  • Slides Booklet
  • Tools/SW
  • Lab Booklet with Code Scripts
  • Class Room Demo
  • Hands On Training
  • Training Videos
  • Cloud Lab Access
  • Lifetime Support
  • Deliverable Via Post
  • 3 Months Access
$ 225

₹ 12,100

Online

$175

₹ 9,500
  • Slides Booklet
  • Tools/SW
  • Lab Booklet with Code Scripts
  • Class Room Demo
  • Hands On Training
  • Training Videos
  • Cloud Lab Access
  • Lifetime Support
  • Deliverable Via Downloads
  • 3 Months Access
$ 175

₹ 9,500

Virtual Class

$300

₹ 16,200
  • Slides Booklet
  • Tools/SW
  • Lab Booklet with Code Scripts
  • Class Room Demo
  • Hands On Training
  • Training Videos
  • Cloud Lab Access
  • Lifetime Support
  • Deliverable Via Downloads
  • 30 Hours Virtual Class
$ 300

₹ 16,200

Have a query?

You got any doubt, question, suggestion in mind? Contact us.

One of our team member will get back to you asap.

Would like to tell the world about this course? Why not share it?

 

 

 

Jay KumarExploit Development