What Do You Need To Know About SANS SEC760: Advanced Exploit Development for Penetration Testers?

Subscribers:
64,000
Published on ● Video Link: https://www.youtube.com/watch?v=YfLe4wa1In8



Duration: 5:05
3,218 views
46


Vulnerabilities in modern operating systems such as Microsoft Windows 7/8, Server 2012, and the latest Linux distributions are often very complex and subtle. Yet, when exploited by very skilled attackers, these vulnerabilities can undermine an organization's defenses and expose it to significant damage. Few security professionals have the skillset to discover, let alone even understand at a fundamental level, why the vulnerability exists and how to write an exploit to compromise it. Conversely, attackers must maintain this skillset regardless of the increased complexity. SANS SEC760: Advanced Exploit Development for Penetration Testers teaches the skills required to reverse-engineer 32-bit and 64-bit applications, perform remote user application and kernel debugging, analyze patches for 1-day exploits, and write complex exploit, such as use-after-free attacks against modern software and operating systems.

You Will Learn:

- How to write modern exploits against the Windows 7/8/10 operating systems

- How to perform complex attacks such as use-after-free, kernel exploit techniques, one-day exploitation through patch analysis, and other advanced topics.

- The importance of utilizing a Security Development Lifecycle (SDL) or Secure SDLC, along with Threat Modeling.

- How to effectively utilize various debuggers and plug-ins to improve vulnerability research and speed.

- How to deal with modern exploit mitigation controls aimed at thwarting success and defeating determination.

Want to learn more about this course? Have a look at sans.org/course/advanced-exploit-development-penetration-testers

James Shewmaker authored and maintains SANS SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking. He also led the development of NetWars in 2009. James regularly teaches a slew of SANS Pen Test courses, including SEC760.




Other Videos By SANS Institute


2019-07-17Creating a Security Metrics Program: How to Measure Success - SANS ICS Security Summit 2019
2019-07-15To Blue with ATT&CK-Flavored Love - SANS Blue Team Summit
2019-07-12OSINT: Not Just Offensive - SANS Blue Team Summit
2019-07-01Defeating Attackers with Preventative Security
2019-06-13Why You Should Take SEC560: Network Penetration Testing and Ethical Hacking
2019-06-13Why You Should Take SEC660: Advanced Penetration Testing, Exploit Writing, and Ethical Hacking
2019-06-13Why You Should Take AUD507: Auditing & Monitoring Networks, Perimeters & Systems
2019-06-13Why You Should Take SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling
2019-06-13Key Take-Aways from SEC401: Security Essentials Bootcamp Style
2019-06-13Key Take-Aways from SEC503: Intrusion Detection In-Depth
2019-06-10What Do You Need To Know About SANS SEC760: Advanced Exploit Development for Penetration Testers?
2019-05-28Not Giving Credit Where Credit is Due - Common Cybersecurity Writing Mistakes
2019-05-27Including Details Most Readers Don’t Read - Common Cybersecurity Writing Mistakes
2019-05-24Escalating Tensions in Difficult Situations - Common Cybersecurity Writing Mistakes
2019-05-23Using FUD to Cause Anxiety - Common Cybersecurity Writing Mistakes
2019-05-22Not Using Parallel Structure - Common Cybersecurity Writing Mistakes
2019-05-21Using More Words Than Necessary - Common Cybersecurity Writing Mistakes
2019-05-20Applying Inconsistent Formatting - Common Cybersecurity Writing Mistakes
2019-05-19Including Indecipherable Graphics - Common Cybersecurity Writing Mistakes
2019-05-18Overstuffing the Paragraphs - Common Cybersecurity Writing Mistakes
2019-05-17Burying the Main Point - Common Cybersecurity Writing Mistakes



Tags:
SANS SEC760
James Shewmaker
penetration testing
ethical hacking
network pentesting
sans institute
exploit development
reverse engingeering
kernel debugging