- Learning Path Libraries: This path is only available in the libraries listed. To access this path, purchase a license for the corresponding library.
- Security
Exploit Development
This path delves deep into the realm of exploit development, focusing on both offensive attack techniques and defensive strategies. Students will gain a comprehensive understanding of modern exploitation methods and advanced concepts through hands-on exercises, practical demonstrations, and theoretical lectures.
Content in this path
Specialized Exploits: Windows and Linux x32 Shellcode
This course focuses on the intricate art of crafting shellcode for both Windows and Linux x32 environments. Students will delve into the depths of assembly language and exploit development techniques specific to these platforms, gaining practical experience in creating and deploying shellcode for various purposes.
- ‘ ### What you will learn:
- Exploit development approach and methodology
- Fundamental attack concepts
- Modern exploit development concepts
- x86_64 Architecture and Data Structures
- Advanced exploit techniques
- Windows & Linux Stack Overflow Attacks
- Bypass Common Defenses
- Generate Assembly: x86 Linux Shellcode
- Generate Assembly: x86 Windows Shellcode
- Advanced Linux attacks
- Advanced bypass techniques
- Modern heap exploitation
- Understanding and executing the attack
- Obtain a shell
- Reading from memory
- Write to Memory
- Linux process injection techniques
- Windows process injection & EDR bypasses
- Windows x86_64 Shellcode
- Advanced Shellcode'
- Students are expected to have a solid understanding of programming languages and familiarity with operating system internals.