26Securelabs Exploit Development course is designed in a way to help you learning exploit development without opening many books. You would learn exploit development by means of hands-on labs.
What you will get?
This course includes 3 hours of downloadable lecture videos which teaches exploit development by practices. We have also added one quiz consisting of 25 questions on exploit development. You will also get courseware PDF which have been used during the videos.
What you will learn?
Exploit development in a nutshell and core concepts, tools and techniques which are building blocks for anyone who wants to learn exploit development in fast pace.
You will learn how to discover buffer overflow vulnerabilities in FTP Servers, Email Server and how to discover weaknesses in web servers. In any exploit development and research, fuzzing place an important role, this course will teach you different methods of fuzzing.
You will learn how to code fuzzers and real working exploits. Follow the pace of course and you should be able to write your own working exploit as explained in the course.
We believe this course is really informative for exploit development, we do not claim it will take you from zero to infinity but you will get what we have explained here.
You will rock once you develop your first working exploit after completing the course, however following instructions is a must.
What you will take home:
Congratulation! You have chosen the path for becoming a true ethical hacker or an experienced penetration tester.
As covered in previous topic, “script kiddie” heavily depends on tools and they really don’t understand what the tool do in the background or how exploit works. Exploit Development’s treasure is basically hidden in the buffer overflows mainly.
Understanding some of core concepts in buffer overflows and exploit development.
Quick explanation on what is Heap and difference between Stack and Heap
Fuzzing Lab Part 1 - Playing with Vulnerable Application. Replicating the crash and discovering vulnerability in FTP Server by using Metasploit ftp_pre_post fuzzer.
Fuzzing Lab Part2 - Replicating the crash again with Metasploit ftp_pre_post fuzzer and attaching the ftp server with Immunity Debugger to find what happened in the background and register value the time application server crashed.
Manually coding our fuzzer in Python. You can download the skeleton from the course curriculum link. Happy Exploit Development
Fuzzing Lab Part 3 - Finding EIP Offset and overwriting the EIP with over manual our own fuzzer. Generating cyclic patterns with Mona.py and learning how to find offset value with Mona.py. Setting up arranging of stack.
Arranging the Stack. Finding the "Stack" Address i.e. finding JMP ESP manually. Generating shell-code and Developing Exploit.
Looking for JMP ESP Addresses. Ways to Jump to the Stack where our shellcode is in memory
Explanation of how we actually wrote the exploit code. Talking about Padding, Stack arrangement and more..
Quick walk through of the whole process we have gone through in developing exploit for this vulnerable application
Discussing different methods of generating payloads
Part 1 of Fuzzing PCMan FTP Server as we have learned in previous lectures and lab sessions
Part 2 of Fuzzing PCMan FTP Server as we have learned in previous lectures and lab sessions
Finding Addresses for JMP Statement. Looking in different DLL file this time
Quickly Developing exploit for PCMan FTP Server
Writing our Fuzzer for manually fuzzing this eMail Server
Replicating Crash and Finding EIP Offset
Finding stack addresses in for esp and coding the exploit for this email server
Write fuzzer for Kolibri Web Server and Overwriting different registers along with EIP Register.
This Quiz will be based on some of core concepts in Exploit Development.
What you should be focusing on in order to gain expertise in exploit development from tools and platforms standpoint.
Explanation on how you can be good in exploit development.
Tips for consideration
Links for downloading these vulnerable applications and our fuzzers and exploits we have developed during the course
This course is solely for the educational purposes. Any party or person involved in this course development or presentation, should not be held responsible for misuse of the information provided in this course. This course is developed to teach ethical hacking and its sole purpose is educational and for positive usage. It discourage any mis use of the course and any activity which conflicts or against any countries cyber, computer, privacy or legal related laws.
Talk on Code Security Review and some general methods on preventing buffer overflows. This is an additional lecture into our course to give you some thoughts and ethical behavior in this course
Exploit Academy's Instructor(s) are professional(s) in ethical hacking and penetration testing. Excited about finding vulnerabilities and passionate about teaching skills we have. You will learn from experienced professional(s) holding CISSP, CEH, CEI and have been delivering security courses around the world.
Our professional(s) have hands-on ethical hacking / penetration testing experience while pen-testing for financial institutions and other industry sectors in real world scenarios.
Exploit-Academy is bringing the knowledge and experience of these professional(s) at your Desktop to take you to the destination of professional in Ethical Hacking. We hope it will be beneficial for your career and thank you for taking the course