Exploit DevelopmentMPICT Winter ICT Educator ConferenceJan 6, 2015 Sam BowneLecture Notes · Projects · Links · Home Page
|
Class DescriptionStudents will take over vulnerable systems with simple Python scripts. Hands-on projects will include:
Technical RequirementsParticipants need a computer (Windows, Mac, or Linux) with VMware Player or VMware Fusion. USB thumbdrives will be available with Kali Linux and Windows Server 2008 virtual machines to use.All the class materials are freely available on my Web page (samsclass.info) for anyone to use. Prerequisite KnowledgeParticipants should be familiar with networking and security concepts at the Network+ and Security+ level. Previous programming experience is helpful but not necessary.Learning OutcomesUpon successful completion of this course, the student will be able to:
TextbookThe Shellcoder's Handbook: Discovering and Exploiting Security Holes, by Chris Anley, John Heasman, Felix Lindner, Gerardo Richarte; ASIN: B004P5O38Q Buy from Amazon |
LecturesCh 1: Before you Begin (pptx)Ch 2: Stack overflows on Linux (pptx)
Exploiting Windows: Introduction
The lectures are in PowerPoint format. |