SEC760: OnDemand

Provided by

Enquire about this course

What You Will Learn

Vulnerabilities in modern operating systems such as Microsoft Windows 10 and 11, and the latest Linux distributions are often very complex and subtle. Yet, when exploited by very skilled attackers, these vulnerabilities can undermine an organization's defenses and expose it to significant damage. Few security professionals have the skillset to discover why a complex vulnerability exists and how to write an exploit to compromise it. Conversely, attackers must maintain this skillset regardless of the increased complexity. SANS SEC760: Advanced Exploit Development for Penetration Testers teaches the skills required to reverse-engineer applications to find vulnerabilities, perform remote user application and kernel debugging, analyze patches for one-day exploits, perform advanced fuzzing, and write complex exploits against targets such as the Windows kernel and the modern Linux heap, all while circumventing or working with against cutting-edge exploit mitigations

You Will Learn
  • How to write modern exploits against the Windows 10 and 11 operating systems.
  • How to perform exploit development techniques such as advanced fuzzing, kernel and driver exploitation, one-day exploitation through patch analysis, Linux heap overflows, and other advanced topics.
  • How to effectively utilize various debuggers and plug-ins to improve vulnerability research and speed.
  • How to deal with modern exploit mitigation controls aimed at thwarting success.
You Will be Able To
  • Discover zero-day vulnerabilities in programs running on fully-patched modern operating systems.
  • Use the advanced features of IDA Pro and write your own IDAPython scripts.
  • Perform remote debugging of Linux and Windows applications.
  • Understand and exploit Linux heap overflows.
  • Fuzz closed-source applications
  • Unpack and examine Windows update packages
  • Perform patch diffing against programs, libraries, and drivers to find patched vulnerabilities.
  • Perform Windows Kernel debugging B
  • Reverse engineer and exploit Windows kernel drivers
You Will Receive With This Course
  • A 4-month license for IDA. The license will come from Hex-Rays and you will need to agree to the terms where your name and e-mail address will be provided.
  • Various preconfigured virtual machines, such as Windows 10.
  • Various tools on a course USB that are required for use in class.
  • Access to the in-class Virtual Training Lab with many in-depth labs.
  • Access to recorded course audio to help hammer home important network penetration testing lessons.
Hands-On Labs
  • Perform labs to reverse-engineer Microsoft patches to identify the patched vulnerability and take them through exploitation.
  • Fuzz closed source applications
  • Remote-debug both Linux and Windows applications, and debug the Windows 10 Kernel.
  • Exploit Linux heap overflows.
  • Bypass modern exploit mitigations.
  • Write your own IDA Python scripts.
  • Debug drivers

Enquire

Start date Location / delivery
No fixed date Virtual Book now

Related article

At GIAC, we believe that hands-on testing is the future of cybersecurity certification. With five certification exams featuring CyberLive , and thr...