Security for Hackers and Developers: Exploit Development
Offered By: Pluralsight
Course Description
Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
This course will help you understand how to prioritize your software security by teaching you how to exploit your security. Make the proper steps to become more secure.
With developers so overloaded, why should you prioritize security fixes? Because hackers are probably writing exploits against your product right now. You need to learn what that process entails to enable a deeper appreciation for the serious defenses needed. In this course, Security for Hackers and Developers: Exploit Development, you'll learn the ins and outs of how to write basic exploits. First, you'll explore control-flow hijacks such as function and return pointer overwrites. Next, you'll cover how to create and debug shellcode. Finally, you'll discover how to overcome common security mitigations using return-oriented programming (ROP). By the end of this course, you’ll know how to exploit programs with confidence, which gives you the skills to defend software, write exploits, or reverse engineer malware.
With developers so overloaded, why should you prioritize security fixes? Because hackers are probably writing exploits against your product right now. You need to learn what that process entails to enable a deeper appreciation for the serious defenses needed. In this course, Security for Hackers and Developers: Exploit Development, you'll learn the ins and outs of how to write basic exploits. First, you'll explore control-flow hijacks such as function and return pointer overwrites. Next, you'll cover how to create and debug shellcode. Finally, you'll discover how to overcome common security mitigations using return-oriented programming (ROP). By the end of this course, you’ll know how to exploit programs with confidence, which gives you the skills to defend software, write exploits, or reverse engineer malware.
Syllabus
- Course Overview 1min
- Auditing, Debugging, and Vulnerabilities 24mins
- Understanding a Function Pointer Overwrite 13mins
- Exploiting a Windows Server Using Shellcode 32mins
- Exploiting a Basic Browser Bug 16mins
- Applying Return-oriented Programming 19mins
Taught by
Dr. Jared DeMott
Related Courses
CNIT 127: Exploit DevelopmentCNIT - City College of San Francisco via Independent Offensive Penetration Testing
LinkedIn Learning Penetration Testing: Advanced Kali Linux
LinkedIn Learning Reverse Engineering Linux 32-bit Applications
PentesterAcademy Exploit Development and Execution with the Metasploit Framework
Pluralsight