Exploit Development Workshop Wintel (W3)

$45.00

Out of stock

The access to this course is restricted to Hakin9 Premium or IT Pack Premium Subscription


In the field of ethical hacking or penetration testing, exploit development forms the core of these fields however not every hacker or a security professional is sound in exploit development.

What usually happen, a security professional and so-called hackers use the exploits, which are developed by the security researchers and available on the Internet and are just the Google search away.


 Pre-requisites

Exploit development requires the thorough understanding of assembly language and how it works on different platforms and different operating systems.

You also need to be a good programmer or at minimum you understand the programming logics and can write your own code in any of object-oriented programming languages.

Exploiting software required hands-on on different tools and techniques and for our workshop we will focus on how to write exploits with Metasploit Framework, Immunity Debugger and its wonderful plugin called “Mona.py” so in summary you need to have better understanding of the following:

    • Assembly Language Concepts

    • One Object-Oriented Programming Language Concepts

    • Buffer overflows

    • Immunity Debugger and “Mona.py”

    • Fuzzers and Fuzzing

    • Fuzzers and Fuzzing

    • Metasploit Framework


Understanding the Basics

To let you concentrate on the exploit development we will try to cover the pre-requisites within our workshop but to the level we feel that you should be comfortable with the concepts so that you don’t need to waste your time in hitting searches on these topics.


 Syllabus


MODULE 1


MODULE 2 

    • SETTING UP THE LAB ENVIRONMENT

        • Lab Setup

        • Downloading & Installing Virtual Box

        • Installing Windows XP as Virtual Machine

        • Downloading Vulnerable Application from Exploit-DB

        • Downloading and Installing Immunity Debugger

        • Metasploit Framework (pre-installed with Kali)

        • Lab IP Addressing


MODULE 3 

    • BASIC SKELETON OF AN EXPLOIT

        • Shellcode or Payload

        • The Example Code

        • Metasploit Exploits Skeleton

        • Core Architecture of Metasploit Exploit Module

        • Exploit


MODULE 4 


MODULE 5


FINAL EXAM

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013