Exploitation (online)

Vulnerability exploitation is one day hacking training focused on buffer overflow vulnerability and its exploitation. This is online training for one person lead by an experienced instructor.

You will get a student book in electronic form. In addition you can use the student book in combination with a remote access to Hackerlab network and practice from anywhere. For more information see VPN Extended labs.

In this training we are going to find out buffer overflow vulnerability in FTP server. At first we write a simple fuzzer to locate a vulnerable end point. Then we construct an exploit to open a remote shell and compromise the server.

Finally we introduce Metasploit framework. We will learn how to lookup between available exploits and how to run an exploitation module.

Prerequisites

  • own laptop, see technical requirements
  • OS Windows user knowledge
  • OS Linux user knowledge
  • TCP/IP protocol understanding

Course detail

  • vulnerability and exploit types
  • you will write own fuzzer to locate vulnerability
  • you will dive into basic assembler and exercise with debugger
  • you will write your own exploit
  • you will compromise FTP server

This course is intended for ...

  • Security analyst

  • Security manager

  • Penetration tester

  • Application security specialist

  • Security monitoring specialist

  • Developer

from 29. 05. 2019
to 29. 05. 2019
(09:00-17:00 hod)

Online
(Show on map)

1 day

6 680 CZK
incl. VAT

Order course
Term Place Course duration Price

from 29. 05. 2019
to 29. 05. 2019
(09:00-17:00 hod)

Online
(Show on map)

1 day

6 680 CZK
incl. VAT

Order course
Exploitace zranitelností
Metasploit framework
debugger

Kamil Krbec

Web application hacking – OWASP Top 10

Realy nice introduction into web application security, practical usage of tools.

Hynek Hladík

Web application hacking – OWASP Top 10

I appreciate very much live demonstrations of OWASP TOP 10 together with hacking tools which help to identify web app weaknesses.

Jan Černý

Web application hacking – OWASP Top 10

Practical examples you can try immediately mixed up with theory. I recommend the training.

Exploitation (online)

successfully added to cart.

cart
×

Blog

Contacts

WABANK – OWASP Top 10 testing

WABANK is deliberately vulnerable web application for security testing according OWASP Top 10 report. Application is free for non commercial usage only.      …

Read more

Kali linux – keep your tools up-to-date

There is lot of hacking tools available in Kali linux but early or late every package becomes older. What we can do with that? In…

Read more

Firewallking (en)

This is an english version of firewalking the rest is in czech

Kontakty

+420 739 639 132

Petr Juhaňák
V Poli 547
517 71 České Meziříčí
Czech Republic

IČO 01259041