What to bring:
Laptop with CDROM
256MB RAM minimum, 2GB free HDD space minimum
Windows® 2000 or XP (at a minimum)
VMware image of Windows XP Pro SP1
Administrator access required
Demo or actual copy of VMware Workstation 5.x
Running copy of Metasploit 2.5
Running copy of MS Visual C++ toolkit
Running copy of OllyDbg:
Bootable Linux CD will be provided for the Linux attack exercises.
|
Overview
This class is targeted for those looking to move beyond “Hacking Exposed” level skills to the next level. This class starts off slow by providing a foundation of programming survival skills of C and assembly. Next, the course moves to processor and memory structure before moving into Linux exploits and Windows Exploits. Finally, automated tools are introduced to speed up the exploit development process.
The class will cover a variety of topics to include: programming, buffer overflows, heap overflows, format string errors, exploiting techniques on Windows and Linux, debugging skills and the latest automation tools. Using this building block approach, the student will gain a working understanding of vulnerabilities, how to prevent them, and how to develop proof of concept exploits from a typical vulnerability alert. This is a hands-on course with half the time spent working through lab examples and real world vulnerabilities.
What You Will Learn:
- Programming Survival Skills (C and C++)
- How to understand error conditions
- Categories of error conditions - stack overflow, heap overflow, off-by-one, format string bugs, integer overflows (this class will deal only with stack, heap and format string errors)
- Unix process memory map
- Win32 process memory map
- Debugging applications (Linux gdb and Windows OllyDbg)
- Identifying error conditions using debugging
- Writing shellcode
- Real life exploit development
- Secure coding practices
- Conducting basic source code reviews for spotting error conditions
- Metasploit Exploit Framework (exploit development and integration)
What You Will Get:
Students will be presented with the following materials to be used and referenced throughout the duration of the course:
Copy of all slides, one bootable CDROM (Linux), and one CDROM with tools, code examples, etc.
Who Should Take This Course:
Pen-testers, security researchers, security professionals looking to move beyond “Hacking Exposed” skills, security students, programmers looking to learn about security implications, technical managers looking to gain a deeper understanding of what hackers are up to.
Prerequisites
Student should have a basic understanding of:
- Security concepts, such as running tools created by others, taught in more basic classes like “Hacking by Numbers”. In this class, student will learn to modify or create their own tools.
- Operating systems, Win32 and Linux
- How to compile programs using GCC, MS Visual C++ Toolkit (but not required).
- Understanding of C or C++ programming would be a bonus (but not required)
What to Bring
|
Trainer:
|
Allen Harper, CISSP, is a Security Engineer in North Carolina with 18 years of IT/Security experience. He holds an MS in Computer Science from the Naval Post Graduate School and a BS in Computer Engineering from North Carolina State University. Allen led the development of the GEN III honeywall CDROM, called roo, for the Honeynet Project. Allen was a co-author of "Gray Hat", the ethical hacker's handbook published by McGraw Hill and served on the winning team (sk3wl of root) in the 2004 DEFCON Capture the Flag contest. Allen has worked as a security consultant for the Internal Revenue Service (IRS) and for Logical Security, LLC.
|