One of the most important steps of ethical hacking is the exploitation of the software errors since the protection is very difficult against it. Several sophisticated attacks happen nowadays through computer networks. The initial step of the attack in many cases is the exploitation of a known or unknown software error that can establish a longer security breach. Because of that, it is essential to understand the different kind of exploitation methods in order to protect our systems more efficiently. Exploitation techniques are shown from using the basic techniques to the latest ones through examples during the courses. The course is specifically practice oriented so participants learn to create own exploits for different software errors.
The course is mainly recommended for software developers, system administrators and ethical hackers, but any other enquirer is very welcome.