In this course, trainees will learn how exploitation works on various operating systems. They will get an introduction to different vulnerability types, learn how to exploit them, create shellcodes, and deal with common exploit mitigation techniques.

Subjects covered:   

  • Logical Vulnerabilities Exploitation
  • Shellcodes
  • How to exploit a race-condition with files
  • Exploit Mitigation Techniques
  • Bypassing Stack Canary (cookie) Exercise
  • Advanced Heap Exploitation techniques
  • Heap Exploitation
  • Bypassing ASLR / DEP

To sign up for the course or for a more detailed course outline, please contact us at [email protected].

Leave Us A Message

To register for our events, write to us.
We’ll be happy to provide further information.