Duration - 7 month / training hours in a month - 18 hours (12 lessons)
Security Development Lifecycle
IDA Python və IDA scripting
IDA ilə Local application debugging
IDA ilə Remote application debugging
Cross-Site Request Forgery (CSRF)
Insecure Direct Object Reference (IDOR)
Extend information Assembler and Architecture
Basics of Syscall, kernel, kernel mode, user mode
Initial information about Syscall, kernel and User Mode, and KernelStack and Heap Total Memory Management (Paging, Segmentation, LDT, GDT)
Stack and Heap overflow, vulnerability techniques like Use after free
Format string exploitation
Analysis of Linux exploit protection mechanisms (Stack canary, PIE, NX, etc.) and bypass mechanisms
Linux application exploitation via IDA and GDB
ASLR bypass mechanism using Format string bugs
Shellcode, ret2lib, and ROP (Return Oriented Programming) mechanisms
Integer overflow exploitation Making fusing syscall file format for a realization.
Realizasiya üçün file format, syscall fuzzing edilməsi
Preliminary data about LFH (Low fragmentation heap) and LBA (Large blocks allocation).
Browser-based and client-side exploitation
ROP (Return Oriented Programming) bypass mechanisms
SEH (Structured Exception Handler)
Win32 based shellcode preparation (Encoding and obfuscation)
Bypass techniques of ASLR, DEP and other exploit protection mechanisms
Price per a person in a group (4-8)
Price for a group of 1-3