Xtreme Exploitation (XE) – Outline

Detailed Course Outline

Module 1: Basic, yet effectively fuzzing Microsoft

  • Excel 2007 (XLS)
  • Identifying the vulnerability
  • Controlling registers and program flow
  • Popping up calc!

Module 2: Understanding Heap Spraying

  • Exploiting a Use-After-Free in Internet Explorer 6
  • Exploiting a Heap Overflow in Adobe Reader 8
  • Exploiting Adobe Reader on Windows 7 using ROP chains
  • Understanding ASLR bypasses