SEARCH
TOOLBOX
LANGUAGES
Training Corelan

Training Corelan

From BruCON 2012

Jump to: navigation, search

This training is sold out.

[edit] Corelan Live! by Peter Van Eeckhoutte

The Corelan Live Bootcamp is a truly unique opportunity to learn both basic & advanced techniques from an experienced exploit developer. During this 2 day course, students will be able to learn all ins and outs about writing reliable exploits for the Win32 platform. The trainer will share his “notes from the field” and various tips & tricks to become more effective at writing exploits.

We believe it is important to explain the basics of buffer overflows and exploit writing, but this is not “your average” entry level course. In fact, this is one of the finest and most advanced courses you will find on Win32 stack based exploit development.

This hardcore hands-on course will provide students with solid understanding of current Win32 (stack based) exploitation techniques and memory protection bypass techniques. We make sure the course material is kept updated with current techniques, includes previously undocumented tricks and techniques, and details about research we performed ourselves. Combined with the way the course is built up, this will turn these 2 days into a truly unique experience.

During the course, we not only share techniques and mechanics, but we also want to make sure you understand why a given technique is used, why something works and why something doesn’t work.

Finally, we offer you post-training support as well. If you have taken the course and you still have questions, we will help.


Prerequisites:

Students should :

  • be able to read simple C code and simple scripts
  • be familiar with writing basic scripts using python/ruby/…
  • be ready to dive into a debugger and read asm for hours and hours and hours
  • be ready to think out of the box and have a strong desire to learn
  • be fluent with managing Windows / Linux operating system and with using vmware workstation/virtualbox
  • be familiar with using Metasploit
  • No prior knowledge of assembly is required, but it will certainly help if you have some basic knowledge :)


Tools/Equipment needed:

Unless specified otherwise, students are required to bring the following :

  • A laptop (no netbook) with vmware workstation/virtualbox and enough processing power and RAM (we recommend 4Gb of RAM) to run up to 2 virtual machines at the same time. Make sure your laptop has a screen size of at least 15″. The use of a 64bit processor and a 64bit operating system on the laptop will make the exercises more realistic.
  • Virtual machines installed, all 32-bit, all English versions, (includingguest addition tools) : A clean / fully patched/updated:

-- Windows XP SP3 Professional, with Internet Explorer 7 (not 8, not 9 !)

-- Windows 7 SP1 with IE8 (not IE9) (64bit version works too) Trial versions are fine. Just make sure the OS won’t expire during the training)

-- BackTrack 5 R1 with an up-to-date version of Metasploit

! Make sure all 3 virtual machines are configured in an VM internal network, and have full access to each other.

! Disable all firewalls.

! Make sure all 3 virtual machines are based on ENGLISH versions of the Operating System.

! Make sure you can transfer files from your host machine to all 3 Guest (virtual) machines.

All required tools and applications will be provided during the training or will be downloaded from the internet during the training. You will also receive a detailed slide deck.

You must have full administrator access to all machines. You must be able to install and remove software, and you must be able to disable and/or remove firewall/antivirus/… when necessary.

More info : https://www.corelan-training.com/index.php/training/corelan-live/

[edit] Trainer Biography

Petervaneeckhoutte.jpg
Peter “corelanc0d3r” Van Eeckhoutte is the founder of Corelan Team and the author of the well-known tutorials on Win32 Exploit Development, available at https://www.corelan.be

Peter has been an active member of the IT Security community for more than 10 years and has been working on exploit development since 2006. He is a Metasploit contributor and main developer of the mona.py exploit development swiss army knife. He presented at various international security conferences (Athcon, Hack In Paris, DerbyCon, ISSA Belgium) and delivered the Corelan Live Win32 Exploit Development Bootcamp at numerous places around the globe. He trained security enthusiasts & professionals from private companies, government agencies and military.


300px-twitter-icon.jpg @corelanc0d3r

http://www.corelan.be

http://www.corelan-training.com


24 & 25 September (09:00 - 17:00)

This training is sold out.

Back to Training Overview