YoVDO

Security for Hackers and Developers: Exploit Development

Offered By: Pluralsight

Tags

Exploit Development Courses Software Security Courses Return-oriented Programming Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
This course will help you understand how to prioritize your software security by teaching you how to exploit your security. Make the proper steps to become more secure.

With developers so overloaded, why should you prioritize security fixes? Because hackers are probably writing exploits against your product right now. You need to learn what that process entails to enable a deeper appreciation for the serious defenses needed. In this course, Security for Hackers and Developers: Exploit Development, you'll learn the ins and outs of how to write basic exploits. First, you'll explore control-flow hijacks such as function and return pointer overwrites. Next, you'll cover how to create and debug shellcode. Finally, you'll discover how to overcome common security mitigations using return-oriented programming (ROP). By the end of this course, you’ll know how to exploit programs with confidence, which gives you the skills to defend software, write exploits, or reverse engineer malware.

Syllabus

  • Course Overview 1min
  • Auditing, Debugging, and Vulnerabilities 24mins
  • Understanding a Function Pointer Overwrite 13mins
  • Exploiting a Windows Server Using Shellcode 32mins
  • Exploiting a Basic Browser Bug 16mins
  • Applying Return-oriented Programming 19mins

Taught by

Dr. Jared DeMott

Related Courses

CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent
Offensive Penetration Testing
LinkedIn Learning
Penetration Testing: Advanced Kali Linux
LinkedIn Learning
Reverse Engineering Linux 32-bit Applications
PentesterAcademy
Exploit Development and Execution with the Metasploit Framework
Pluralsight