Curriculum
- 10 Sections
- 10 Lessons
- 60 Hours
Expand all sectionsCollapse all sections
- WinDbg Tutorial1
- Stack Buffer Overflows1
- Exploiting SEH Overflows1
- Intro to IDA Pro1
- Overcoming Space Restrictions1
- Shellcode From Scratch1
- Reverse-Engineering Bugs1
- Stack Overflows and DEP/ASLR Bypass1
- Format String Specifier Attacks1
- Custom ROP Chains and ROP Payload Decoders1
Master advanced techniques for exploiting stack overflows while bypassing modern security mitigations such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR).
Prev
Learn how to construct custom Return-Oriented Programming (ROP) chains to bypass security defenses and build ROP payload decoders for stealthy exploitation.
Next