Userland exploitation

Description

In this training the student will learn what is needed to write user space exploits. The training will follow a theoretical and practical (hands-on) approach. We will first discuss the theoretical underpinnings of exploiting vulnerabilities in user space and then discuss in detail how vulnerabilities occur and how we can exploit them. In the end we will discuss the protections and mitigations that aim to make it difficult to exploit vulnerabilities in user space and how we can circumvent them.

Prerequisites

Our methodology aims that anyone understands the content of our training. We seek to explain the fundamental concepts clearly, to avoid jargons and unfamiliar terms, to pass the content in several ways to help in fixing the content. Not to mention that our training has a great practical approach, hands-on.

The list of prerequisites are as follows:

  • C and assembly programming
  • Unix fundamentals
  • Basic knowledge about operating system and computer architecture
  • Basic knowledge about memory management
  • Debugging

What’s more, our training is tailored to the knowledge and experience of the class. This is your chance to expand your knowledge and reach the next level in your career.

Benefits

  • Access to the private mailing list for students
  • Updated content
  • Practical Training (Hands-on)
  • Accessible language
  • Experienced instructor

Target audience

Security Researchers
Security Analysts
Malware Analysts
Penetration Testers
Security Companies
Computer Science and Computer Engineering Students
Law enforcement agents
Anyone willing to learn and practice vulnerability exploitation

Upcoming Training

Coming soon

Agenda

Coming soon