This course teaches exploitation methods from simple stack overflows to type confusion bugs in C++ code using various techniques including return-oriented programming and engineering read/write primitives.
This course teaches exploitation methods from simple stack overflows to type confusion bugs in C++ code using various techniques including return-oriented programming and engineering read/write primitives.
This course is led by experienced instructors from NCC Group’s Exploit Development Group (EDG), who develop bespoke exploits and tools for use on client engagements.
The EDG has developed exploits against popular software such as Internet Explorer, Firefox, Flash, Adobe Reader, Windows Kernel, Xen, and Java. They provide extensive knowledge and experience in reverse engineering and low-level debugging.
You should take this course if:
NCC Group’s Exploit Development is training for consultants, code reviewers, reverse engineers, and exploit developers who want to understand how to exploit vulnerabilities in native code.
We assess, develop and manage cyber threats across our increasingly connected society. We advise global technology, manufacturers, financial institutions, critical national infrastructure providers, retailers and governments on the best way to keep businesses, software and personal data safe.
© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy