Security for Hackers and Developers: Exploit Development
Developers are busy, but understanding how to exploit software will help you properly prioritize security critical bugs. This course will teach you basic exploits, shellcoding, and return-oriented programming (ROP).
With developers so overloaded, why should you prioritize security fixes? Because hackers are probably writing exploits against your product right now. You need to learn what that process entails to enable a deeper appreciation for the serious defenses needed. In this course, Security for Hackers and Developers: Exploit Development, you’ll learn the ins and outs of how to write basic exploits. First, you’ll explore control-flow hijacks such as function and return pointer overwrites. Next, you’ll cover how to create and debug shellcode. Finally, you’ll discover how to overcome common security mitigations using return-oriented programming (ROP). By the end of this course, you’ll know how to exploit programs with confidence, which gives you the skills to defend software, write exploits, or reverse engineer malware.
Author Name: Dr. Jared DeMott
Author Description:
Dr. Jared DeMott is an engineer, entrepreneur, and security leader. DeMott previously served as a vulnerability analyst with the NSA. He holds a PhD from Michigan State University. He regularly speaks on cyber matters at conferences like RSA, DerbyCon, BlackHat, ToorCon, GrrCon, HITB, etc. He was a finalist in Microsoft’s BlueHat prize contest, which helped make Microsoft customers more secure. Dr. DeMott has been on three winning Defcon capture-the-flag teams, and has been an invited lecturer … more
Table of Contents
- Course Overview
1min - Auditing, Debugging, and Vulnerabilities
24mins - Understanding a Function Pointer Overwrite
13mins - Exploiting a Windows Server Using Shellcode
32mins - Exploiting a Basic Browser Bug
16mins - Applying Return-oriented Programming
19mins
There are no reviews yet.