Exploitation

Vulnerability exploitation is one day hacking training focused on buffer overflow vulnerability and its exploitation. The training is lead by an experienced instructor in a group of 4 to 8 persons.

You will get a student book in electronic form. In addition you can use the student book in combination with a remote access to Hackerlab network and practice from anywhere. For more information see VPN Extended labs.

In this training we are going to find out buffer overflow vulnerability in FTP server. At first we write a simple fuzzer to locate a vulnerable end point. Then we construct an exploit to open a remote shell and compromise the server.

Finally we introduce Metasploit framework. We will learn how to lookup between available exploits and how to run an exploitation module.

Prerequisites

  • own laptop, see technical requirements
  • user knowledge of OS Windows
  • user knowledge of OS Linux
  • user knowledge about protocols TCP/IP

Course detail

  • vulnerability and exploit types
  • you will write own fuzzer to locate vulnerability
  • you will dive into basic assembler and exercise with debugger
  • you will write your own exploit
  • you will compromise FTP server

This course is intended for ...

  • Security analyst

  • Security manager

  • Penetration tester

  • Application security specialist

  • Security monitoring specialist

  • System administrator

  • Tester

  • Developer

from 21. 02. 2020
to 21. 02. 2020
(09:00-17:00 hod)

Praha
(Show on map)

1 day

6 680 CZK
incl. VAT

Order course

from 28. 02. 2020
to 28. 02. 2020
(09:00-17:00 hod)

Ostrava
(Show on map)

1 day

6 680 CZK
incl. VAT

Order course

from 03. 03. 2020
to 03. 03. 2020
(09:00-17:00 hod)

Hradec Králové
(Show on map)

1 day

6 680 CZK
incl. VAT

Order course
Term Place Course duration Price

from 21. 02. 2020
to 21. 02. 2020
(09:00-17:00 hod)

Praha
(Show on map)

1 day

6 680 CZK
incl. VAT

Order course

from 28. 02. 2020
to 28. 02. 2020
(09:00-17:00 hod)

Ostrava
(Show on map)

1 day

6 680 CZK
incl. VAT

Order course

from 03. 03. 2020
to 03. 03. 2020
(09:00-17:00 hod)

Hradec Králové
(Show on map)

1 day

6 680 CZK
incl. VAT

Order course
Exploitace zranitelností
Metasploit framework
debugger

(Čeština) Radomír Zdarsa

Kali linux and TCP/IP protocols

Sorry, this entry is only available in Czech.

(Čeština) Petr Stránský

Host discovery and port scanning (online)

Sorry, this entry is only available in Czech.

Kamil Krbec

Web application hacking – OWASP Top 10

Realy nice introduction into web application security, practical usage of tools.

Hynek Hladík

Web application hacking – OWASP Top 10

I appreciate very much live demonstrations of OWASP TOP 10 together with hacking tools which help to identify web app weaknesses.

Exploitation

successfully added to cart.

cart
×

Blog

Contacts

10 kroků pro bezpečný web

Ať už si stavíte malý blog, eshop nebo dáváte agentuře vyrobit „mikrosajtu“, budete řešit zabezpečení svého webu před útoky z internetu. V následujících odstavcích se dozvíte,…

Read more

OSCP – Cesta k certifikaci

V tomto příspěvku se bych se rád podělil o tipy, jak se připravit na OSCP certifikaci. Na úvod řeknu, že jsem začínal jako vývojář a…

Read more

(Čeština) Kali linux na Raspberry Pi

Sorry, this entry is only available in Czech.

Kontakty

+420 739 639 132

Petr Juhaňák
V Poli 547
517 71 České Meziříčí
Czech Republic

IČO 01259041