Description
In this training the student will learn what is needed to write kernel space exploits. The training will follow a theoretical and practical (hands-on) approach. We will first discuss the theoretical underpinnings of exploiting vulnerabilities in kernel space and then discuss in detail how vulnerabilities occur and how we can exploit them. In the end we will discuss the protections and mitigations that aim to make it difficult to exploit vulnerabilities in kernel space and how we can circumvent them.
Prerequisites
Our methodology aims that anyone understands the content of our training. We seek to explain the fundamental concepts clearly, to avoid jargons and unfamiliar terms, to pass the content in several ways to help in fixing the content. Not to mention that our training has a great practical approach, hands-on.
The list of prerequisites are:
- C and assembly programming
- Basic knowledge about operating system and computer architecture
- Basic knowledge about memory management
- Exploiting user space vulnerabilities
- Debugging
What’s more, our training is tailored to the knowledge and experience of the class. This is your chance to expand your knowledge and reach the next level in your career.
Benefits
- Access to the private mailing list for students
- Updated content
- Practical Training (Hands-on)
- Accessible language
- Experienced instructor
Target audience
Security Researchers
Security Analysts
Malware Analysts
Penetration Testers
Security Companies
Computer Science and Computer Engineering Students
Law enforcement agents
Anyone willing to learn and practice software exploitation
Upcoming Training
For more information such as registration, price, capacity and technical details, click on the class below.
Agenda*
Day 01
Computer architecture and operating systems
Memory management
Work and research environment
Day 02
Difference between user space and kernel space
Kernel space vulnerabilitiesDebugging
Day 03
Kernel internals
Example of kernel vulnerabilities and its exploitation
Dynamic allocation in kernel space and its issues
Day 04
Mitigations and bypassesMicro-architectural and hardware vulnerabilities
Conclusion and future
* The agenda is subject to change.