Immunity's Unethical Hacking course focuses on teaching fundamentals of Windows x86 exploitation by having students write exploits! This class attempts to teach a strategic approach to attack and penetration that goes beyond "penetration testing" to model how a real attacker approaches targeting your company.
Security professionals familiar with x86 assembler, some reverse engineering, debugging, and Windows memory management will be best suited for this course. Immunity's trainers have developed a Prerequisite Evaluation for all potential students to take prior to signing up for the Unethical Hacking class. This evaluation will help ensure that this class is right for you.
For additional information, pricing quotes, or a copy of the Prerequisite Evaluation, please send an email to firstname.lastname@example.org.
Unethical Hacking Class Syllabus*
Day 1: Intro
- Introduction to Assembly language
- Understanding stacks and memory layout
- Understanding calling conventions
- Introduction to buffer overflows
- Post-mortem analysis using Immunity Debugger
- Build your own exploits against entry-level targets using VisualSploit (challenge level: easy - medium)
Day 2: Exploit Writing
Build your own exploits against real targets using VisualSploit (challenge level: easy - medium)
Day 3: Exploit Writing
Build your own exploits against real targets using VisualSploit (challenge level: medium - high)
Day 4: Attack Automation Using CANVAS
Advanced usage of the CANVAS exploitation framework
- Enumerate hosts on the network
- Fingerprint found hosts on the network
- Remote Exploitation
- Client-Side Exploitation using ClientD
- Maintain persistence on compromised devices using trojans/rootkits
- Escalation of privileges via local vulnerabilities
- Build your own custom local command (in Python using the CANVAS API)
- Bounce from one compromised machine to another to get further into a network
- Find and exploit vulnerabilities in a custom web application. First to get root wins a prize!
* class syllabus is subject to change