LearnSkill Certified Exploit Developer (L| CED)
This Exploit Writing & Development Training course is a highly advanced course in industry. It includes analysing of softwares, in order to exploit its weaknesses and strengthen its defences. Exploring reverse engineering ie. learn how to analyse software even without having access to its source code.
Exploit writing training will start off by learning the low-level to high level language used to communicate with the computer. We will use a demonstration-and-challenge approach which guides our students passive observation to practical implementation of binary exploit & development techniques.
- Prerequisite: Ethical Hacking Foundation course/(L-CEH)
- Training Duration: 40 Hrs. Stretched / 5 Days (Bootcamp for working candidates only)
- Level: Intermediate to advance.
- Includes Reverse engineering, Malware analysis and Documenting Binary exploits.
- Learn advanced debugging and patching techniques with GUI tools.
- Understand binary obfuscation techniques.
- Identify and analyse anti-debugging and anti-analysis tricks.
Exploit Writing & Development Training Syllabus
|01 – Exploit Development Life Cycle|
|02 – System Architecture|
|03 – Memory Organisation|
|04 – Experimenting with Bash|
|05 – Powershell Programming|
|06 – Python Scripts to perform exploits|
|07 – Assembly Language|
|08 – GDB usage -operating debugger, decompilers|
|09 – Prevention and Bypassing Address Space Layout|
|10 – Randomization & DEP protection mechanisms|
|11 – Shell Code- Shell-Spawning, Port Binding, Connect-Back|
|12 – Fuzzing with SPIKE|
|13 – Challenges: KSTET and GMON|
|14 – Bypassing Antivirus Software|
|15 –Safe SEH Based Overflow|
|16 – Egg Hunting|
|17 – Exploiting Character Set Restrictions|
|18 – Windows Buffer Overflow Exploitation|
|19 – Linux Buffer Overflow Exploitation|
|20 – Windows Kernel Driver Exploitation|
|21 – Kernel Pool Exploitation|
|22 – Precision Heap Spraying|
|23 – RCE on Windows and Linux|
|24 – Logless Exploitation|
|25 – Privilege Escalation|
|26 – Bypassing File Extension Filters|
|27 – Type Juggling|
|28 – NX/ASLR Bypass – Using different techniques to bypass Data Execution|
|29 – Reverse Engineering of a Windows Executable|
|30 – Summary|
It has been a wonderful journey with them.
Jatin -Working as a Pentester
Best institute for Ethical Hacking & Information Security trainings
Vishal -Threat Analyst (Axis bank)
Small places make big changes..!!
Karan -Right now I am working in EY.