Subscribe to the RSS Feed

Subscribe to the RSS Feed

Basic Memory Corruption: Introduction to Stack-based Exploitation


Early Bird Registration: $975 USD (Ends May 1st, 2019)
Standard Registration: $1250 (Ends May 18th, 2019)
On-site Registration: $1600 USD

Training Registration

Head over to the Registration page for more details or click below to register directly via Universe:



Get Tickets

Overview

This training focuses on learning the essentials of stack-based memory corruption and exploitation. Attendees of this training will learn about exploitation of Intel architecture through memory corruption attacks, specifically: buffer overflows, format string vulnerabilities, and DTOR/GOT overwrites. We’ll also learn how to write shellcode and bypass non-executable stacks using return-to-libc attacks. Trainees will also learn the basic mitigation techniques used to prevent various memory corruption attacks. This is meant to be a foundational course that can serve as jumping off point for those wishing to learn advanced exploitation techniques, such as: ROP chains, heap spraying, use-after-free, and defeating ASLR.

Topics covered in this training:

  • 32-Bit Intel Architecture Overview
  • Intel Memory Management
  • IA32 Calling Conventions & System Calls
  • IA32 Stack Operations and Management
  • Stack-based Buffer Overflows
  • Format String Vulnerabilities
  • Executing Arbitrary Code & Shellcoding
  • Non-Executable Stacks
  • Defeating Non-Executable Stacks

Who Should Take This Course?

This course is intended for bug bounty hunters, software developers, software QA testers, penetration testers, security analysts, security administrators, network administrators with a security focus, and anyone else interested in learning about . This course focuses on the fundamentals of binary exploitation and is appropriate for beginner to intermediate skill levels.

Student Requirements

Trainees should bring a laptop equipped with VMWare or Virtualbox with at least 25GB of disk space and 8GB of memory. Previous experience with C programming, Intel (x86) assembly, and basic memory management concepts is highly recommended in order to benefit from this training.

What Will Students Be Provided With?

All students will be provided with a course-package that includes: a detailed course guide to supplement the training material, and a preconfigured virtual machine containing each of the lab exercises performed in class, plus some extras.

Trainers

Gabriel Ryan is an offensive security R&D and red teamer. He is the author of EAPHammer, a toolkit for performing targeted rogue access point attacks against enterprise wireless networks. Gabriel has presented at DEF CON, DerybCon, Hackfest, and several Security BSides conferences on topics ranging from infrastructure security to access control protocols and red team tradecraft. His professional interests include wireless security, systems internals, low-level programming, and infrastructure automation.

Return to the Trainings page.

(^Top)