THE EXPLOIT LABORATORY: INTRODUCTION TO EXPLOIT DEVELOPMENT
Saumil Shah
October 06 - 07, Melbourne, Australia
EARLY BIRD
$3080
ENDS June 30
REGULAR
$3300
ENDS August 31
LATE
$3520
STARTS September 01
Prices are GST inclusive
OVERVIEW
The Exploit Laboratory's introductory course is an all new beginner to intermediate level class, for those curious to dig deeper into the art and craft of software exploitation. We begin with a quick overview of memory corruption and stack overflows and then move on to browser exploits, heap sprays and vtable overwrites. The latter part of the class covers practical examples on defeating modern day exploit mitigation techniques like DEP and ASLR using Return Oriented Programming (ROP).
In addition to core exploit development, the class also focuses heavily on developing debugging skills, performing root cause analysis and negotiating complex obstacles.
The Exploit Laboratory requires a lot of hands on work. Lab examples used in this class feature popular third party applications and products instead of simulated lab exercises.
All topics are delivered in a down-to-earth, learn-by-example methodology. The same trainers who brought you The Exploit Laboratory for over nine years have been working hard in putting together advanced material based on past feedback.
LEARNING OBJECTIVES
- Memory Corruption Bugs - past and present
- Stack Overflows on Linux and Windows
- Browser Exploits
- PDF Exploits
- Heap Spraying in browsers and PDF readers
- Abusing Objects in memory - vftable overwrites
- Exploiting browsers via object corruption
- Introduction to Return Oriented Programming
- Defeating DEP using ROP
- Bypassing ASLR on Windows 7
SYLLABUS
Day 1
- Memory Corruption Bugs - past and present
- Stack Overflows on Linux and Windows
- Browser Exploits
- PDF Exploits
- Heap Spraying in browsers and PDF readers
- Abusing Objects in memory - vftable overwrites
Day 2
- Exploiting browsers via object corruption
- Introduction to Return Oriented Programming
- Defeating DEP using ROP
- Bypassing ASLR on Windows 7
ABOUT THE TRAINER
Saumil Shah is the founder and CEO of Net-Square, providing cutting edge information security services to clients around the globe. Saumil is an internationally recognized speaker and instructor, having regularly presented at conferences like Blackhat, RSA, CanSecWest, PacSec, EUSecWest, Hack.lu, Hack-in-the-box and others. He has authored two books titled "Web Hacking: Attacks and Defense" and "The Anti-Virus Book".
Saumil graduated with an M.S. in Computer Science from Purdue University, USA and a B.E. in Computer Engineering from Gujarat University. He spends his leisure time breaking software, flying kites, traveling around the world and taking pictures.
RECOMMENDATIONS
- A conceptual understanding of how functions work in C programming
- Knowledge of how a stack works, basic stack operations
- Familiarity with debuggers (gdb, WinDBG, OllyDBG or equivalent)
- Not be allergic to command line tools.
- Have a working knowledge of operating systems, Win32 and Unix.
- Have a working knowledge of shell scripts, cmd scripts or Perl.
HARDWARE AND SOFTWARE REQUIREMENTS
- A working laptop (no Netbooks, no Tablets, no iPads)
- Intel Core 2 Duo x86/x64 hardware (or superior) required
- 4GB RAM required, at a minimum
- Wireless network card
- 20 GB free Hard disk space
- Linux / Windows / Mac OS X desktop operating systems
- VMWare Player / VMWare Workstation / VMWare Fusion MANDATORY
- Administrator / root access MANDATORY