OffSec - EXP301

EXP-301: Windows User Mode Exploit Development(線上課程及認證考試方案)

EXP-301: Windows User Mode Exploit Development
  • 時數:0小時
  • 費用:NT$ 57,570
  • 點數:不適用企業點數

選擇查詢分區開課時間

地點 班號 日期 時間 預約

目前查無開課時段

詳細開課時間請洽詢業務
新竹、台中、高雄如有上課需求,請參考台北開課日期,洽當地服務人員依需求加開遠距開課日期

聯絡恆逸

教材

原廠電子教材

課程目標

Windows User Mode Exploit Development (EXP-301) is a course that teaches learners the basics of modern exploit development. Despite being a fundamental course, it is at the 300 level because it relies on substantial knowledge of assembly and low level programming. It begins with basic buffer overflow attacks and builds into learning the skills needed to crack the critical security mitigations protecting enterprises. Learners who complete the course and pass the exam earn the OffSec Exploit Developer (OSED) certification. The OSED is one of three certifications making up the OSCE³ certification along with the OSEP for advanced penetration testing and OSWE for web application security.

線上課程方案介紹 (恆逸金銀卡會員另有優惠)

● Course & Cert Exam Bundle:NT57,570/一次性(含90天Lab與1次考試)

● Learn One: NT90,490/一年(含365天Lab與2次考試)

● Learn Unlimited:NT200,000/(含365天Lab與無限次考試)

適合對象

  1. Windows User Mode Exploit Development is an intermediate course designed for those who want to learn about exploit development skills
  2. Job roles like penetration testers, exploit developers, security researchers, Malware analysts, and software developers working on security products, could benefit from the course

預備知識

  1. Familiarity with debuggers (ImmunityDBG, OllyDBG)
  2. Familiarity with basic exploitation concepts on 32-bit
  3. Familiarity with writing Python 3 code
  4. Ability to read and understand C code at a basic level
  5. Ability to read and understand 32-bit Assembly code at a basic level

課程內容

  1. Windows User Mode Exploit Development: General Course Information
  2. WinDbg and x86 Architecture
  3. Exploiting Stack Overflows
  4. Exploiting SEH Overflows
  5. Introduction to IDA Pro
  6. Overcoming Space Restrictions: Egghunters
  7. Creating Custom Shellcode
  8. Reverse Engineering for Bugs
  9. Stack Overflows and DEP Bypass
  10. Stack Overflows and ASLR Bypass
  11. Format String Specifier Attack Part I
  12. Format String Specifier Attack Part II
  13. Trying Harder: The Labs

學會技能

  1. Learn the fundamentals of reverse engineering
  2. Create custom exploits
  3. Develop the skills to bypass security mitigations
  4. Write handmade Windows shellcode
  5. Adapt older techniques to more modern versions of Windows

備註事項

推薦課程