applied security conferences and training: CanSecWest | PacSec | EUSecWest |

Security Masters Dojo

Advanced and intermediate security training and technology enhancement for information security professionals.

CanSecWest: Security Masters Dojo Vancouver

Introductory Exploit Lab

Register for March 2-3 Course

Advanced Exploit Lab

Register for March 4-5 Course

Register for both Courses

Intro and Advanced labs

Instructor(s):
Saumil Shah
Josh Ryder

Description

The Exploit Laboratory for 2013, in its 8th year running, is an all new beginner to intermediate level class, for those curious to dig deeper into the art and craft of software exploitation. We begin with an introduction to process execution, memory corruption bugs, stack overflows and exception handler overwrites. We then work our way to deeper concepts like heap overflows and integer overruns.

The Exploit Laboratory requires a lot of hands on work. Lab examples used in this class cover Linux, Windows and Android platforms, featuring popular third party applications and products instead of simulated lab exercises. Students get to work with real world challenges encountered during exploit writing solving them using creative solutions such as egghunter shellcode, protocol friendly payloads, etc.

We end the class with a mini "Capture The Flag" contest where you shall put your newly acquired exploit writing skills to test in a near-real-world environment.

As with the popular Exploit Laboratory, all topics are delivered in a down-to-earth, learn-by-example methodology. The same trainers who brought you The Exploit Laboratory for over 8 years have been working hard in putting together advanced material based on past feedback.

*** NOTE: THIS CLASS MAY BE COMBINED WITH "THE ADVANCED EXPLOIT LABORATORY" AS A 4 DAY COURSE.

Learning Objectives

Class Outline

Day 1: Day 2:

Target Audience

PREREQUISITE WARNING Each class has prerequisites for software loads and a laptop is mandatory. These individual class guides will list material the students are expected have knowledge about coming in and software tools that need to be pre-installed before attending so you get the maximum benefit from the focused intermediate or advanced level course. Please pay particular attention to the prerequisites, as the material listed there will not be reviewed in the courses, and will be necessary to get the maximum benefit out of these educational programs.

Prerequisites

Hardware Requirements

Software Requirements