SlideShare a Scribd company logo
“Black Hat Courses”
Advanced Exploit Development
By :
Danang Heriyadi
< danang@hatsecure.com >
Hat Secure Training
Session 1
Outline Courses | Day 1
● Basic Exploit Development
– Debugging
– Fuzzing
– Direct Return
– Smashing Stack For Fun and Profit
– Case Of Study ( From CVE )
● CVE-2008-4250
● CVE-2010-2568
● Etc
Outline Courses | Day 2
● Advanced Exploit Development #2
– Stack Hardener or Mitigation
– Bypassing :
– Data Execute Prevention
– Structure Exeption Handler
– Safe Structure Exception Handler
– Case Of Study ( Microsoft )
● Proof Of the Concept MS12-05
● Proof Of the Concept MS12-020
Outline Courses | Day 3
● Advanced Exploit Development #3
– Corruption the Heap
– Heap Spraying the Software
● Internet Explorer
● Mozilla
● Etc
– Metasploit Module Development
Outline Courses | Day 4
● Advanced Exploit Development #4
– Single Denial Of Service
● Using Buffer Overflow Vulnerability
– Shellcode Development
● Static Shellcode
– Shellcode Injection
● PE Infection
– Reporting vulnerability
Are you ready?
June – July

More Related Content

PPTX
How I Learnt hacking in High School - BSidesLV - 2015
PDF
Ethical Hacking / Penetration Testing Training & Coaching
PDF
Cybersecurity during real WAR [English version]
PPTX
Play,Learn and Hack- CTF Training
PDF
Linux Exploit Research
PDF
Advanced Exploit Development (Updated on 28 January, 2016)
PDF
Seminar Hacking & Security Analysis
PPTX
Return Oriented Programming (ROP) Based Exploits - Part I
How I Learnt hacking in High School - BSidesLV - 2015
Ethical Hacking / Penetration Testing Training & Coaching
Cybersecurity during real WAR [English version]
Play,Learn and Hack- CTF Training
Linux Exploit Research
Advanced Exploit Development (Updated on 28 January, 2016)
Seminar Hacking & Security Analysis
Return Oriented Programming (ROP) Based Exploits - Part I

Viewers also liked (20)

PDF
Workshop 101 - Penetration testing & Vulnerability assessment system
PDF
Backtrack 5 - network pentest
PDF
Syllabus Advanced Exploit Development 22-23 June 2013
PDF
Workshop 101 - Penetration testing & Vulnerability Assessment
PDF
Return-Oriented Programming: Exploits Without Code Injection
TXT
Exploit techniques - a quick review
PDF
Course lecture - An introduction to the Return Oriented Programming
PDF
Backtrack 5 - web pentest
PDF
Ethical hacking
PDF
Low Level Exploits
PDF
Web Hacking (basic)
PDF
PDF
CODE BLUE 2014 : Microsoft Vulnerability Research: How to be a Finder as a Ve...
PDF
Sourcefire Vulnerability Research Team Labs
PDF
Materi Vulnerability Development
PDF
Workshop tp link router & open wrt
PPT
Logical Attacks(Vulnerability Research)
PDF
Exploiting arm linux
PDF
Linux Shellcode disassembling
PPTX
07 - Bypassing ASLR, or why X^W matters
Workshop 101 - Penetration testing & Vulnerability assessment system
Backtrack 5 - network pentest
Syllabus Advanced Exploit Development 22-23 June 2013
Workshop 101 - Penetration testing & Vulnerability Assessment
Return-Oriented Programming: Exploits Without Code Injection
Exploit techniques - a quick review
Course lecture - An introduction to the Return Oriented Programming
Backtrack 5 - web pentest
Ethical hacking
Low Level Exploits
Web Hacking (basic)
CODE BLUE 2014 : Microsoft Vulnerability Research: How to be a Finder as a Ve...
Sourcefire Vulnerability Research Team Labs
Materi Vulnerability Development
Workshop tp link router & open wrt
Logical Attacks(Vulnerability Research)
Exploiting arm linux
Linux Shellcode disassembling
07 - Bypassing ASLR, or why X^W matters
Ad

Similar to Advanced exploit development (20)

PDF
N3XAsec CPTE plan de estudios detallado
PPTX
Leveraging Black Duck Hub to Maximize Focus - Entersekt’s Approach to Empower...
PDF
Chris Rutter: Avoiding The Security Brick
DOCX
Current Article Review1. Locate a current article about Regul.docx
PDF
MTA 361 software development fundamentals
PPTX
Incident Prevention and Incident Response - Alexander Sverdlov, PHDays IV
PPTX
How to implement NIST cybersecurity standards in my organization
PDF
Avoiding the security brick
PDF
Majdi_Halawani_CV
PDF
Cmgt 442 cmgt442
PDF
Threat Modeling workshop by Robert Hurlbut
PDF
Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Def...
DOCX
PDF
OTechs-Hacking_and_Penetration_Testing
PPT
Qualys user group presentation - vulnerability management - November 2009 v1 3
PDF
CS3391 -OOP -UNIT – III NOTES FINAL.pdf
PDF
Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...
PDF
Online Sync meetup: Metasploit 101 slides
PPTX
Ethical Hacking Conference 2015- Building Secure Products -a perspective
PPTX
Server-side template injection- Slides
N3XAsec CPTE plan de estudios detallado
Leveraging Black Duck Hub to Maximize Focus - Entersekt’s Approach to Empower...
Chris Rutter: Avoiding The Security Brick
Current Article Review1. Locate a current article about Regul.docx
MTA 361 software development fundamentals
Incident Prevention and Incident Response - Alexander Sverdlov, PHDays IV
How to implement NIST cybersecurity standards in my organization
Avoiding the security brick
Majdi_Halawani_CV
Cmgt 442 cmgt442
Threat Modeling workshop by Robert Hurlbut
Big Bang Theory: The Evolution of Pentesting High Security Enviroments IT Def...
OTechs-Hacking_and_Penetration_Testing
Qualys user group presentation - vulnerability management - November 2009 v1 3
CS3391 -OOP -UNIT – III NOTES FINAL.pdf
Battista Biggio @ ICML 2015 - "Is Feature Selection Secure against Training D...
Online Sync meetup: Metasploit 101 slides
Ethical Hacking Conference 2015- Building Secure Products -a perspective
Server-side template injection- Slides
Ad

Recently uploaded (20)

PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Modernizing your data center with Dell and AMD
PDF
cuic standard and advanced reporting.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Electronic commerce courselecture one. Pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Empathic Computing: Creating Shared Understanding
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
GamePlan Trading System Review: Professional Trader's Honest Take
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
KodekX | Application Modernization Development
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Cloud computing and distributed systems.
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Network Security Unit 5.pdf for BCA BBA.
Modernizing your data center with Dell and AMD
cuic standard and advanced reporting.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
The AUB Centre for AI in Media Proposal.docx
The Rise and Fall of 3GPP – Time for a Sabbatical?
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Electronic commerce courselecture one. Pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Empathic Computing: Creating Shared Understanding
NewMind AI Monthly Chronicles - July 2025
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
GamePlan Trading System Review: Professional Trader's Honest Take
Review of recent advances in non-invasive hemoglobin estimation
KodekX | Application Modernization Development
MYSQL Presentation for SQL database connectivity
Cloud computing and distributed systems.

Advanced exploit development