Exploit Development


About this course?

The course is focused on a comprehensive coverage of software exploitation. It will present different domains of code exploitation and how they can be used together to test the security of an application. The participants will learn about different types and techniques of exploitation, using debuggers to create their own exploits, understand protection mechanism of the Operating Systems and how to bypass them. The course is heavily focused on being hands-on. Reference material documents will be provided for concepts for further reading. Course content slides will demonstrate attacks performed in-class and explain concepts where needed.

Table of Contents

Session 1
Session 2
Session 3
Session 4
  • Module 7: Exploiting with Structured Exception Handlers (SEH)
Session 5
Session 6

Register for a training

Previous TrainingExploiting Internet of Things
Next TrainingWindows Internals Essentials
Anurag Banerjee, Student

Experience in IIS was very good. Trainers are experienced and are so helpful.

Sreelakshmi Nair, Student

Excellent course, good teaching & knowledgeable trainers.

Ashish Nageshkar, Student

Faculties are good & very helpful. They provide very precise guidance. Good ambience.