> > > XE Detailed outline

Xtreme Exploitation (XE)

Course Description Schedule Course Outline

Detailed Course Outline

Day 1

  • Basic, yet effectively fuzzing Microsoft Excel 2007 (XLS)
  • Identifying the vulnerability
  • Controlling registers and program flow
  • Popping up calc!

Day 2

  • Understanding Heap Spraying
  • Exploiting a Use-After-Free in Internet Explorer 6
  • Exploiting a Heap Overflow in Adobe Reader 8
  • Exploiting Adobe Reader on Windows 7 using ROP chains
  • Understanding ASLR bypasses