Vulnerabilities in modern operating systems such as Microsoft Windows 7/8, Server 2012, and the latest Linux distributions are often very complex and subtle. Yet, they could expose organizations to significant attacks, undermining their defences when wielded by very skilled attackers. Few security professionals have the skill set to discover let alone even understand at a fundamental level why the vulnerability exists and how to write an exploit to compromise it. Conversely, attackers must maintain this skill set regardless of the increased complexity. Our Exploit Writing Training Program teaches the skills required to reverse engineer 32-bit & 64-bit applications, perform remote user application & kernel debugging, analyse patches for 1-day exploits, & write complex exploits, such as use-after-free attacks, against modern software and operating systems. We will start with the basics of stack based buffer overflows and study saved return pointer and structured exception handler overwrites in depth. We will look at methods for dealing with space issues such as egg hunting and relative jumps. We will also cover dealing with character set limitations, such as Unicode conversions and alphanumeric shellcode. We will also look at writing shell code manually in assembly. Then we will move onto bypassing more advanced anti-exploitation measures such as stack cookies, ASLR, DEP, etc. In addition, to writing exploits from scratch we will look at public exploit code and porting it to fit our environment's needs. We will also look at writing Metasploit modules and porting our exploits into Metasploit.
Certified Exploit Writer certifications allow employers to immediately determine the best candidate for an IT Security position. IT Security Experts holding Exploit Writing certifications can give huge skills in a broad range of knowledge on Pen-Testing.
Organizations today recognize the strong need for Exploit Writer, Whether you are a Fresher or an Experienced Professional , Certified Global Exploit Writer will distinguish yourself from the crowd to become most in-demand IT Security Professional with courage.
Stack Overflows
in Linux with GDB
It attempts to show the reader the basics of stack overflows &
explain some of the protection mechanisms present in modern linux distributions.
Structured Exception Handler Exploits
SEH is a Windows mechanism for handling both hardware and software exceptions consistently.
Egghunters in
Windows & Linux
It is used when there are not enough available consecutive memory locations to insert the shell code. Instead, a unique "tag" is prefixed.
Return Oriented Programming
Return Oriented Programming (ROP) is a powerful technique used to counter common exploit prevention strategies
PDB Exploits &
Kernel Exploitation
The pdb module exploits the Python interpreter's debugging & tracing hooks to implement a simple command-line-oriented debugger.