Advanced Exploit Development

Course Group: 
Cyber Security
Course Outline: 

COURSE OVERVIEW

This course takes students with a strong foundation in exploit development and exposes them to the most recent operating system defences.  This course is set in the era of Windows 10, and examines browser exploits, advanced mitigation technique bypass, cutting edge tools and advanced exploitation strategies.  In this interactive course, participants will learn and apply techniques to bypass or weaken a range of modern security controls such as Address Space Layout Randomisation (ASLR), Data Execution Protection (DEP/NX) and Stack Cookies on x86 and x86 64 processors.

By the end of the course, students will be able to formulate advanced exploitation strategies and begin to understand the core theory concepts which underpin the art and science of modern exploit development. Course alumni will be well placed to contribute as part of high end penetration testing teams, security engineers and architects, and secure coding professionals.

NB: This course is not an introductory course, and should not be taken by students just starting out in their exploit development careers.  

Who Should Attend?

Course Outline

Presenter Information

Further Information

Dates & Registration

Duration: 5 days

Delivery mode: Face-to-face

Locations: Canberra

In-House Delivery: Contact the  for more information. Recommended for groups with over 10 personnel.

What you will receive:

  • Access to the full version of IDA Pro for the duration of the course.
  • Comprehensive set of course notes.
  • UNSW certificate of attendance.
  • Morning tea, lunch and afternoon tea.

Affiliated course: Introduction to Exploit Development (5 days)

 


 

WHO SHOULD ATTEND

  • Intermediate exploit developers looking to gain an edge against modern systems.
  • Advanced pentesters with exploit development experience.
  • Experienced software engineers.

 


 

COURSE OUTLINE

  • Modern security protections.
  • Bypass techniques.
  • Planning to bypass modern controls.
  • x86_64 exploitation.
  • Exploitation against non-x86 targets.
  • Advanced tool use.
  • Capstone exercise.
  • Shellcode obfuscation.

 


 

AUSTRALIAN CENTRE FOR CYBER SECURITY

The Australian Centre for Cyber Security (ACCS) is a focal point for the research of some 60 scholars from various faculties across UNSW who conduct research work on different aspects of cyber security. The Centre is based in Canberra at the Defence Force Academy that provides both advanced research as well as undergraduate and graduate education on cyber security. ACCS brings together the biggest concentration of research and tertiary education for the multi-disciplinary study of cyber security in any single university in the Southern hemisphere. A number of ACCS scholars, in areas ranging from information technology and engineering to law and politics, have significant international reputations for their work.  

 


 

FURTHER INFORMATION

Luke Garner 
Centre Manager
Centre for Australia Cyber Security
UNSW Canberra
M: +61 438 229 323
E:  l.garner@adfa.edu.au        
W: www.accs.unsw.adfa.edu.au
 
No dates? Or unable to attend dates shown? Submit an Expression of Interest below to be notified of upcoming courses.

COURSE AVAILABILITY

CANBERRA
18 June 2018 - 22 June 2018