Exploitation
About
In this course, trainees will learn how exploitation works on various operating systems. They will get an introduction to different vulnerability types, learn how to exploit them, create shellcodes, and deal with common exploit mitigation techniques.
Syllabus Summary
Exploitation Techniques
Subjects Covered:
- Logical Vulnerabilities Exploitation
- Shellcodes
- Heap Exploitation
- Exploit Mitigation Techniques
- Bypassing Stack Canary (cookie) Exercise
- Bypassing ASLR / DEP
Course Pricing & Payment Terms
- To sign up for the course or for a more detailed course outline, please contact us at [email protected].
Category: Specialized Training