Exploit Development

Part I

This intensive 3-day course provides cybersecurity professionals with the foundational and practical skills required to master exploit development on Linux systems. Through guided labs and structured exercises, participants will learn how low-level memory vulnerabilities can be transformed into working exploits, gaining control over binary execution flow.

The training begins with core concepts such as stack frames, heap behavior, and CPU registers, before progressing into practical exploitation of buffer overflows. By examining real-world vulnerabilities alongside controlled lab binaries, students will understand how mitigations like ASLR, NX, stack canaries, and PIE are bypassed in practice.

Participants will gain hands-on experience using professional-grade tooling, including GDB, and GEF while dissecting ELF binaries with utilities such as objdump and readelf. Special emphasis is placed on analyzing memory layouts, crafting shellcode, and leveraging compilation flags to recreate vulnerable scenarios.

By the end of the course, students will be able to confidently analyze crashes, trace execution flow at the assembly level, and write proof-of-concept exploits. The course bridges theory with practice, equipping red teamers, vulnerability researchers, and defenders with a deep understanding of binary exploitation that remains highly relevant in today’s offensive and defensive operations.

Course curriculum

    1. Introduction to Exploit Development

    2. Outline of Exploit Development Training

    3. Slides

    4. Exploit Development and Exploits

    5. Real World Exploit Development

    6. Vulnerability and Exploitation

    7. Memory Management, Instructions and Data

    8. Tools for Debugging

    9. Introduction to GDB Part I

    10. Introduction to GDB Part II

    11. Binary Compilation Process, System and Dynamic Memory layout

    12. Hands on Binary Compilation Process

    13. Binary Analysis

    14. Exploring The Stack

    15. Stack vs Heap

    16. Assembly Language and Instructions

    17. MOV Instructions in Assembly

    18. Endianness and Registers

    19. Size of Registers and Flags

    20. EIP, LEA, NOP, and other Instructions

    21. Function Calls, Conditionals and C Main

    22. Stack Overflow

    23. Buffer Overflow Practice Part I

    24. Buffer Overflow Practice Part II

    25. Shellcode explanation

    26. Stack Buffer Overflow

    27. In depth explanation

    28. Return to the environment Technique

    29. JMP EAX Technique

    30. JMP ESP Technique

    31. DEP Bypass Technique

    32. ASLR Bypass Technique

About this course

  • $199.00
  • 32 lessons
  • 6 hours of video content

Requirements

While not mandatory, it is recommended that participants have the following tools installed to fully engage with the hands-on exercises:

  • Ubuntu System x32
  • Kali Linux
  • GEF Plugin

These tools will enhance your ability to work effectively with the course materials and practical exercises.