دوره Cheating on Windows, Fuzzing and Buffer Overflow: Attack Scenarios and Protection Methods

  • CQURE
  • 1,093 بازدید
  • 0 نظر

Cybercriminals are constantly developing more sophisticated ways to hack into systems. According to an April 2021 report, between the third and fourth quarters of 2020 :

  • Microsoft Office malware increased by 199%.
  • Account hijackings are targeted at Office 365 accounts.
  • Exploits targeting new vulnerabilities meanwhile shot up 100% in Q4.
  • Targeted attacks increased 43%.

To protect organisations and people from cybercrime, we have a duty to continuously level up our skills. That’s why we created this advanced cybersecurity training“Cheating on Windows, Fuzzing and Buffer Overflow: Attack Scenarios and Protection Methods.” This advanced training is a recorded lesson extracted from our AWSC 2020 edition. In just 2 hours, you’ll learn how to identify buffer-overflow vulnerabilities in Windows applications, exploit remote code execution vulnerability, and use various modern mitigations for vulnerabilities. In short, you will learn how to apply additional mitigations against software attacks in a short time. We highly recommend this advanced training to cybersecurity specialists, penetration testers, offensive security specialists, and any cybersecurity expert wanting to add to their repertoire of skills and boost their career.

Syllabus

  1. What is exploit
  2. Buffer Overflow
  3. Fuzzing
  4. Debuggers
  5. Vulnserv
  6. Exploitation demo
  7. Exploitation prevention
  8. Exploit guard

Cheating on Windows, Fuzzing and Buffer Overflow: Attack Scenarios and Protection Methods