Linux Exploiter V1 course is for student whom want to enhance their skills in linux exploit development. This course covers x86 architecture exploit development in linux with hands-on fuzzing techniques to bypass new vulnerabilities. Instructor first teach i386 exploitation and after getting understand that how things work switch to i686. Detailed explanation about kernel memory architecture, working flows and remote call are going to be first priority in this course.
This is not entry level course we recommend student to have some knowledge of assembly and GDB before enrolling in this course.
Research and development of exploits in linux_x86 is one of the most important topic in this course. Student will learn how to customize their exploit find vulnerability and create vulnerability if doesn’t exists any, instructor teach how to generate shellcode against custom exploit and bypass security (i.e KASLR, NX). Instructor assures that student should be working with no-win vulnerabilities
There is not expiration of certification until major update required student need to update course by getting only updated content of course-ware. Hard copy will be shipped to address according shipping policies.
Trainer will share all the research notes and some tricks to make course more effective and understandable. After completion of course student will be added to support community where community members and instructor can help out. This is very important for student stay focused during the course sessions and get ready for a lot of memory stress