Throughout 2013 we have given training courses on a variety of advanced subjects which have consistently been filled with students from around the globe. The classes have been hosted both publicly at security events, our headquarters in Texas, and privately at military and government institutions. As the year draws to a close, we’ve had a chance to reflect on the content we’ve taught and how we can raise the bar even higher in 2014. To that end, we’re excited to announce that we have combined material from our Breaking Binary Applications, Bughunting and Analysis 101, Dynamic Reverse Engineering, and Browser Exploitation classes into a single week-long master course that we will deliver publicly at 3 locations in 2014.
The new course, titled the Vulnerability Development Master Class, will be taught by the entire Exodus team over the course of 5 consecutive days.
Dates & Locations
The dates and locations are as follows (venue information will be distributed to registered attendees):
- March 24th-28th: Boston, MA, USA
- July 7th-11th: Amsterdam, The Netherlands
- September 15th-19th: San Francisco, CA, USA
If we receive sufficient interest in hosting additional events the above list may expand. Reach out to us via training@exodusintel.com or on twitter via @ExodusIntel for any inquiries.
Prerequisites
We have compiled a summary of prerequisites, the abstract, dates and locations into a single PDF for reference: Exodus Intelligence Vulnerability Development Master Class
Abstract
This 5 day course is designed to provide students with a comprehensive and progressive approach to understanding advanced vulnerability and exploitation topics on the Windows platform. Attendees will be immersed in hands-on exercises that impart valuable skills including static and dynamic reverse engineering, zero-day vulnerability discovery, binary instrumentation, and advanced exploitation of widely deployed server and client-side applications.
Taught by the entire Exodus Intelligence team, this course provides students with direct access to our renowned professionals in a setting conducive to individual interactions.
Syllabus
- Reverse Engineering
- Static Reverse Engineering
- Code Representation and Graph Theory
- Recognizing Non-Determinism
- Recognizing Data Structures
- Symbol Mining
- Harvesting Useful Code
- C++ Type Recovery
- Scripting Disassemblers
- Dynamic Reverse Engineering & Automation
- Non-Intrusive Target Monitoring
- Recovering Type Information
- Code Flow Analysis
- Symbol Recovery
- Instrumentation with PIN
- Isolating Interesting Code & Data
- Static Reverse Engineering
- Debugging
- Core Windows Userspace Concepts
- Memory Management
- Process Lineage
- Integrity Levels
- Windows Services
- Inter-Process Communication
- Local Inter-Process Communication
- Remote Process Communication
- The Windows Linker & Loader
- Exception Handling
- Core Debugger Concepts
- Attaching (Intrusive vs Non-Intrusive)
- Breakpoints
- Global Flags
- Image File Execution Options
- Scripting with PyKD
- Annoyances & Solutions
- Core Windows Userspace Concepts
- Vulnerabilities Overview & Recognition
- Recognizing Vulnerability Patterns
- Automated Discovery
- Memory Corruption
- Type Confusion
- Improper Allocations
- Arithmetic Issues
- Format Strings
- Use-After-Free
- Buffer Overflows
- Design Flaws
- Vulnerability Discovery
- Manual Auditing Processes
- Dumb Fuzzing
- “Intelligent” Fuzzing
- Ambulance Chasing
- Binary Diffing
- Client-Side Discovery Techniques
- Server-Side Discovery Techniques
- Exploitation
- Memory Manipulation & Scope
- Windows Mitigations & Bypasses
- Enhanced Mitigation Experience Toolkit (EMET)
- Bypassing EMET
- Achieving Reliability
- Post Exploitation
- Sandboxes
- Process Continuation
Pricing and Registration
The cost for the 5-day course is $6500 USD per student. You may e-mail training@exodusintel.com to register and we will supply a purchase order.
We have also made available this template request form for individuals to help justify attendance to management.