threat intelligenceVulnerability Development Master Class

Since our inception, Exodus Intelligence has provided training courses on a variety of advanced subjects which have consistently been filled with students from around the world. Over the last few years, we’ve hosted Master Classes in the USA, Asia, and Europe–both publicly and privately (by request).

Once again, our flagship course–the Vulnerability Development Master Class–returns with new content, taught by recognized experts. Known as some of the best in the industry, Exodus instructors are armed with real-world experience, as well as multiple Pwn2Own victories and PWNIE awards.

This 5-day course is designed to elevate each participant’s skill set in vulnerability discovery and exploitation from novice to expert. The material for this class will be exclusive zero-day in widely used software. Every target is a real application with a leading market share. We believe adhering to real-world examples helps students understand, in context, the severity of the flaws they unearth.

Dates & Locations

The dates and location are as follows (venue information will be distributed to registered attendees):

  • October 17th-21st: Austin, Texas

If we receive sufficient interest in hosting additional events, the above list may expand. Reach out to us via [email protected] or on twitter via @XI_Research for any inquiries.

Prerequisites

In order to fully benefit from this course, participants should have working knowledge of at least one assembly language (x64/x86 is preferred), vulnerability classes and their related exploitation. Each participant is expect to bring their own laptops with the following software:

  • IDA Pro
  • Vmware Workstation

Abstract

This 5-day course is designed to provide students with a comprehensive and progressive approach to understanding advanced vulnerability and exploitation topics. Attendees will be immersed in hands-on exercises that impart valuable skills, including:

  • Static and dynamic reverse engineering
  • Zero-day vulnerability discovery
  • Advanced exploitation of widely deployed server and client-side applications

Taught by some of Exodus Intelligence’s leading experts, this course provides students with direct access to our renowned professionals in a setting conducive to individual interactions.

Syllabus

Targets

The majority of the content will be directed at Microsoft Windows targets. There are a few brief sessions covering exploitation of a popular embedded system to arm attendees with advanced exploitation techniques unique to embedded chips.

Activities

Each session of the course is designed to address at least one of the three main activities related to Vulnerability Research: Discovery, Analysis, and Exploitation.

Techniques

The sessions are designed to provide insight into the most effective and advanced techniques in the industry. Each session is designed to highlight each technique’s advantages and disadvantages. Attendees will be exposed to competing techniques for the same solution. Ultimately, attendees will leave our course with the knowledge of each approach and the ability to choose the optimal approach for the circumstances.

  • Vulnerability Discovery
    • CPU-Specific Exploitable Bugs
    • OS-Specific Exploitable Bugs
    • Wide Variety of Memory-based Bug Classes
      • UAF, Double Free
      • Type Confusion
      • Integer Signedness
      • Integer Sizing
      • Unchecked Boundary Values
    • Static Binary Code Auditing
      • Obtaining Context
      • Recognizing Data Structures
      • Manual Code Coverage Techniques
      • Reconstructing Type Information
      • Eliminating Noise
      • Recognizing Exploitable Vulnerability Code Constructs
      • IDA Scripting to Reduce Complexity
    • Dynamic Discovery
      • Manual Fuzzing
      • Crash Binning
      • Measuring and Enhancing Code Coverage
      • Code Flow Analysis
      • Taint Propagation
  • Vulnerability Analysis
    • Static Analysis
      • Identifying Exploit Constraints
      • Recognizing the Code Path
      • Crafting the Data Stream
    • Dynamic Analysis / Crash Triage
      • Discovering Engineering Features
      • Debugging a Live Target
      • Root Cause Determination
      • Debugger Scripting
        • Heap Instrumentation
        • Code Flow Analysis
        • Taint Analysis
  • Exploitation
    • Memory Management Constraints
      • Stack Exploitation Nuances
        • x64 vs x86 vs MIPS
      • Heap Exploitation Nuances
        • Bug Class Mechanics
        • OS-Specific Mechanics
        • Product-Specific Mechanics
        • Technique-Specific Mechanics
    • Memory-Based Exploit Mitigations & Bypasses
      • Bypassing Current Technology
        • EMET
        • ASLR
        • DEP
        • CFI
        • /GS
      • Future Anti-ROP Technology
        • Binary Randomization
        • Stack Pointer Delta Checks
    • Post Exploitation
      • Elevation of Privilege
      • Cleanup Activities
    • Moving From PoC to Production
      • Ensuring Reliability
      • QA Considerations
      • Maintenance Considerations

Pricing and Registration

The cost for the 5-day course is $6500 USD per student. Register here and pay via stripe, or you can e-mail [email protected] to register and we will supply an invoice. We have also made available this template request form for individuals to help justify attendance to management.