Supporting Event: Certified Information Systems Security Professional (CISSP® ) certification (25 Jun 2018)

Supporting Event: Certified Information Systems Security Professional (CISSP® ) certification (25 Jun 2018)

Certified Information Systems Security Professional (CISSP®) certification Date: 25-29 June,...

Supporting Event: GDPR Hands-on workshop 2018 (26 Jun 2018)

GDPR Hands-on workshop 2018 Date: 26th June, 2018 (Tue)Time: 9:00am - 6:00PM (Whole day workshop...

Supporting: (ISC)2 Online Training Options (Especially for APAC based candidates)

Supporting: (ISC)2 Online Training Options (Especially for APAC based candidates)

1. CISSP Online Instructor-Led Training30 Apr - 27 Jun 2018 (19:00-21:30 | GMT+8)Training Only:...

  • Supporting Event: Certified Information Systems Security Professional (CISSP® ) certification (25 Jun 2018)

    Supporting Event: Certified Information Systems Security Professional (CISSP® ) certification (25...

  • Supporting Event: GDPR Hands-on workshop 2018 (26 Jun 2018)

  • Supporting: (ISC)2 Online Training Options (Especially for APAC based candidates)

    Supporting: (ISC)2 Online Training Options (Especially for APAC based candidates)

Ethical Hacking Workshop - Deep dive of Exploit Writing

Date : Feb 20, 2016

Time : 10am-5pm (one hour lunch time included) 

Venue : Room ADC301, HKU SPACE Admiralty Learning Centre

Language : Mandarin

Registration : http://goo.gl/pwomCM (PISA member only)

** Equipment : You should bring your notebook with VM player installed and you should have a full administrative privilege login to perform the exercise in the workshop

Speaker : Orange Tsai, Security Consultant of DEVCORE, member of CHROOT/HITCON, Speaker of HITCON/AVTokyo/WooYun, DEFCON CTF Runner-up, discovered vulnerabilities and reported to Microsoft, Django, Yahoo, Facebook and Google. Orange is specialize in hacking methodology, web security and penetration testing 

 

Topic : Deep dive of Exploit Writing

Exploit Writing Introduction and Prerequisite

- Assembly

- Binary Execution

- ccl (C compiler)

- ld (linker)

- Simple ELF (Executable and Linkable Format) Structure

- Calling Convention

- Call Stack

- Static/Dynamic Analysis & Tools

- Memory Based Attack

Hands on workshop

- How to writing Exploit 

- introduction of different kind of Attack

-- Stack Buffer Overflow

-- Format String (optional)

-- Shellcode Writing

-- Defense

-- Stack Canary

-- DEP

-- ASLR

-- PIE

- Bypass

-- ROP

-- Ret2lib

-- DynELF leak libc base

 

Six CPE can be claimed for the (ISC2) Credential Holder.

For any questions, please contact us at This email address is being protected from spambots. You need JavaScript enabled to view it.