SEC760: Advanced Exploit Development for Penetration Testers Vulnerabilities in modern operating systems such as Microsoft Windows 7/8, Server 2012, and the latest Linux distributions are often very complex and subtle. Yet these vulnerabilities could expose organizations to significant attacks, undermining their defenses when attacked by very skilled adversaries. Few security professionals have the skill set to discover let alone even understand at a fundamental level why the vulnerability exists and how to write an exploit to compromise it. Conversely, attackers must maintain this skill set regardless of the increased complexity. SEC760: Advanced Exploit Development for Penetration Testers, the SANS Institute’s only 700-level course, teaches the skills required to reverse-engineer 32- and 64-bit applications, perform remote user application and kernel debugging, analyze patches for one-day exploits, and write complex exploits, such as use-after-free attacks, against modern software and operating systems. Some of the skills you will learn in SEC760 include: • How to write modern exploits against the Windows 7/8/10 operating systems • How to perform complex attacks such as use-after-free, kernel and driver exploitation, one-day exploitation through patch analysis, and other advanced attacks • How to effectively utilize various debuggers and plug-ins to improve vulnerability research and speed • How to deal with modern exploit mitigation controls aimed at thwarting success Authors’ Statement “As a perpetual student of information security, I am excited to offer SEC760: Advanced Exploit Writing for Penetration Testers. Exploit development is a hot topic as of late and will continue to increase in importance moving forward. With all of the modern exploit mitigation controls offered by operating systems such as Windows 7 and 8, the number of experts with the skills to produce working exploits is highly limited. More and more companies are looking to hire professionals with the ability to conduct a Secure-SDLC process, perform threat modeling, determine if vulnerabilities are exploitable, and carry out security research. This course was written to help you get into these highly sought-after positions and to teach you cutting-edge tricks to thoroughly evaluate a target, providing you with the skills to improve your exploit development.” —Stephen Sims “Teaching and helping author SEC760: Advanced Exploit Writing for Penetration Testers has given me the opportunity to distill my past experiences in exploit writing and technical systems knowledge into a format worth sharing. This course is meant to give you a look into a number of different exploitation techniques and serves as an amazing jumping-off point for exploitation of any modern application or system. Even if you don’t plan on having a career in exploit writing or vulnerability research, this course will be valuable in understanding the thought process that goes into constructing an exploit and what technologies exist to stop an exploit writer from being successful.” —Jaime Geiger You Will Be Able To • Discover zero-day vulnerabilities in programs running on fully-patched modern operating systems. • Use the advanced features of IDA Pro and write your own IDAPython scripts. • Perform remote debugging of Linux and Windows applications. • Understand and exploit Linux heap overflows. • Fuzz closed-source applications • Unpack and examine Windows update packages • Perform patch diffing against programs, libraries, and drivers to find patched vulnerabilities. • Perform Windows Kernel debugging B • Reverse engineer and exploit Windows kernel drivers What You Will Receive • A four-month license to IDA Pro, which is provided by Hex-Rays, is included in this course. In order to obtain the license, you must agree to the terms, including providing your name and an e-mail address, so that Hex-Rays may assign the license. After the course ends, students may choose to extend the license at a discounted rate by contacting Hex-Rays. (If you choose to opt-out, then you must bring a copy of IDA Pro 7.4 advanced or later.) • Various preconfigured virtual machines, such as Windows 10 • Various tools on a course USB that are required for use in class • Access to the in-class Virtual Training Lab with many in-depth labs • Access to recorded course audio to help hammer home important network penetration testing lessons 6 Day Program 46 CPEs Laptop Required sans.org/sec760 • Watch a preview of this course • Discover how to take this course: Online, In-Person