CNIT 127: Exploit Development
Offered By: CNIT - City College of San Francisco via Independent
Course Description
Overview
Learn how to find vulnerabilities and exploit them to gain control of target systems, including Linux, Windows, Mac, and Cisco. This class covers how to write tools, not just how to use them; essential skills for advanced penetration testers and software security professionals.
Advisory: CS 110A or equivalent familiarity with programming
Upon successful completion of this course, the student will be able to:
- Read and write basic assembly code routines
- Read and write basic C programs
- Recognize C constructs in assembly
- Find stack overflow vulnerabilities and exploit them
- Create local privilege escalation exploits
- Understand Linux shellcode and be able to write your own
- Understand format string vulnerabilities and exploit them
- Understand heap overflows and exploit them
- Explain essential Windows features and their weaknesses, including DCOM and DCE-RPC
- Understand Windows shells and how to write them
- Explain various Windows overflows and exploit them
- Evade filters and other Windows defenses
- Find vulnerabilities in Mac OS X and exploit them
- Find vulnerabilities in Cisco IOS and exploit them
Syllabus
Class 1: Ch 1: Before you Begin
Class 2: Ch 2: Stack overflows on Linux
Class 3: Ch 3: Shellcode
Class 4: Ch 4: Introduction to format string bugs
Class 5: Ch 5: Introduction to heap overflows
Class 6: Ch 6: The Wild World of Windows
Class 7: Lecture 7: Intro to 64-Bit Assembler (Not in book)
Class 8: Ch 8: Windows overflows (Part 1)
Class 9: Ch 8: Windows overflows (Part 2)
Class 10: Guest TBA
Class 11: Ch 14: Protection Mechanisms
Class 12: Ch 16: Fault Injection, Ch 17: The Art of Fuzzing
Class 13: Ch 18: Source Code Auditing
Class 14: Hopper Debugger
Class 15: Last Class: TBA
Taught by
Sam Bowne
Tags
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network