… or the WTFBBQ maker :)
Last month I had the pleasure to have @corelanc0d3r inhouse giving away knowledge and pain equally as part of his *amazing* Win32 Exploit Development Bootcamp.
I thought a quick review is in order so here it is.
You will get two days training in which Peter will fill your head with information about the following topics:
- x86 environment basics
- Saved return pointer overwrites
- Structured Exception Handlers overwrites
- Limited buffers, shellcode splitting
- Fun with Unicode
- Heap Spraying Fundamentals
- Egg Hunters
- Writing exploits for the Metasploit Framework
- Bypassing ASLR
- Bypassing NX/DEP
- Return Oriented Programming
- Advanced Heap Spraying
- Use After Free
Yes, I know. It’s a lot right? Well, that’s why it’s called a bootcamp ;)
Let me warning you, this is a *challenging* course. Even if you are familiar with some of the materials and have had some exposure to the advanced topics you will have to keep focused and do a lot of hands on for loooong hours.
You’ll have to keep Peter’s pace (good luck with that :P) and use Immunity Debugger intensively so make sure to be familiar with its basic operation because you have no time for “what was the shortcut for that?”
The course is organized as an BYOL so make sure as well that your virtual machines run with ease and for example, your harddrive is not hogging them.
It’s a fact. Quite probably you are not going to be able to go through all the material in class and you will forget the half of it after a couple of days. Peter is well aware of it :)
Learning is an ongoing process so the course doesn’t end with the live training. After it you will get access to a student site and a second (private) #corelan IRC channel. There you will be able to ask all questions you’ll have when revisiting the materials at home (*) as well as discuss with some other students.
All in all, an amazing training from one exploiting expert worldwide for a ridiculous price. Don’t miss it.
(*) Do it fuckers!