This training course will impart the theoretical and practical principles of the functionality and development of exploits. The main aim here is to examine how target platforms are structured, what special aspects they contain, what different methods for analyzing vulnerabilities exist, what tools are important for exploit development (debuggers, disassemblers, exploit frameworks, etc.) and how various types of vulnerability can be exploited. The two-day course will also examine the question of what opportunities are available for protecting yourself against attackers' exploitation of the shown vulnerabilities and how hackers may circumvent these protection measures.
Basic knowledge of operating systems and computer architecture