In this training the student will learn what is needed to write kernel space exploits. The training will follow a theoretical and practical (hands-on) approach. We will first discuss the theoretical underpinnings of exploiting vulnerabilities in kernel space and then discuss in detail how vulnerabilities occur and how we can exploit them. In the end we will discuss the protections and mitigations that aim to make it difficult to exploit vulnerabilities in kernel space and how we can circumvent them.
Our methodology aims that anyone understands the content of our training. We seek to explain the fundamental concepts clearly, to avoid jargons and unfamiliar terms, to pass the content in several ways to help in fixing the content. Not to mention that our training has a great practical approach, hands-on.
The list of prerequisites are:
- C and assembly programming
- Basic knowledge about operating system and computer architecture
- Basic knowledge about memory management
- Exploiting user space vulnerabilities
What’s more, our training is tailored to the knowledge and experience of the class. This is your chance to expand your knowledge and reach the next level in your career.
- Access to the private mailing list for students
- Updated content
- Practical Training (Hands-on)
- Accessible language
- Experienced instructor
Computer Science and Computer Engineering Students
Law enforcement agents
Anyone willing to learn and practice software exploitation
For more information such as registration, price, capacity and technical details, click on the class below.
Computer architecture and operating systems
Work and research environment
Difference between user space and kernel space
Kernel space vulnerabilities
Example of kernel vulnerabilities and its exploitation
Dynamic allocation in kernel space and its issues
Mitigations and bypasses
Micro-architectural and hardware vulnerabilities
Conclusion and future
* The agenda is subject to change.