CNIT 127: Exploit DevelopmentPending ApprovalSpring 2015 Sam BowneSchedule · Lecture Notes · Projects · Links · Home Page
|
Catalog DescriptionLearn how to find vulnerabilities and exploit them to gain control of target systems, including Linux, Windows, Mac, and Cisco. This class covers how to write tools, not just how to use them; essential skills for advanced penetration testers and software security professionals.Advisory: CS 110A or equivalent familiarity with programming Upon successful completion of this course, the student will be able to:
Textbook"The Shellcoder's Handbook: Discovering and Exploiting Security Holes ", by Chris Anley, John Heasman, Felix Lindner, Gerardo Richarte; ASIN: B004P5O38Q Buy from Amazon |
Schedule (not ready yet) |
---|
Lecture NotesIntroduction to Exploitation: Linux on x86
1: Before you begin |