Attacking Instant Messaging Applications by Iddo Eldor & Nitay Artenstein

Few publicly-known hacks have inspired the imagination of security researchers as much as exploits against IM (instant messaging) applications. 0-click attacks aimed against applications such as WhatsApp, iMessage, and Telegram have raised unprecedented interest and have often caused political turmoil. Yet, in sharp contrast with the curiosity that IM exploitation generates, public information about this surface remains scant. This training is our bid to bridge the gap. Read more...

Attacking the Linux Kernel by Andrey Konovalov

This training guides researchers through the field of Linux kernel security. In a series of exercise-driven labs, the training explores the process of finding, assessing, and exploiting kernel bugs in a modern Linux distribution on the x86-64 architecture. Read more...

Practical Browser Fuzzing by Patrick Ventuzelo

First, this course will give you all the prerequisites to understand modern web browsers' architecture and significant components. Then, you will create and set up a testing environment allowing you to easily replay, debug, minimize and analyze existing issues, CVEs, and PoCs. Over dedicated modules, you will discover and fuzz the main browser components such as DOM, JS engines, JIT compilers, WebAssembly, and IPC. Read more...

The ARM64 Exploit Laboratory 2023 (Brand New) by Saumil Shah

This class is ideal for students who want to go from zero to deep in understanding and exploiting real world vulnerabilities on Linux ARM64. Students shall study key differences between ARM32 and ARM64, dive into ARM64 assembly, debugging 64-bit processes and practically exploiting memory corruption vulnerabilities on ARM64. Read more...

Baseband Exploitation by Amat Cama

Basic understanding of cellular networks, understanding of the interaction between baseband and base stations, understanding of typical baseband architectures, ability to identify and exploit vulnerabilities in the baseband, understanding the interaction between cellular processors and application processors, reverse engineering embedded firmware. Read more...

Limited Seats - Remember to reserve your ticket!

register now