Early bird registration rate ends on the 31st of January
This four-day training will teach students without prior experience how to develop exploits for modern binary software, taking them from 1990s style buffer overflows through exploitation of use-after-frees in programs protected by NX, ASLR and other exploit mitigation technology. The training will focus on exploiting Linux user mode x86/x64 binaries, but the lessons learned from the class are widely applicable to other platforms and architectures.
This course will train students how to reason about the fundamental structures that give rise to software vulnerabilities, underlie various exploitation techniques, and drive mitigation development. Students will leave with hands-on experience writing exploits, and the theoretical knowledge necessary to exploit vulnerabilities discovered in the wild.
This training is designed to teach exploitation to individuals with little to no prior background in the field. Students with prior experience are also encouraged to attend to learn different approaches and methods for exploit development.
DAY 1 โ Fundamentals
DAY 2 โ Classic Exploitations
DAY 3 โ Overcoming Exploit Mitigations
DAY 4 โ Putting It All Together
Students are expected to have experience programming in C or C++, and basic knowledge of the Linux command line. Prior experience with reverse-engineering is nice to have, but not required.