openPR Logo
Press release

The Exploit Laboratory 3.0 comes to Hack In The Box 2008

09-16-2008 01:57 PM CET | IT, New Media & Software

Press release from: Hack In The Box

/ PR Agency: HITB
Kuala Lumpur, Malaysia 12th September 2008 -- Buffer overflows and remote exploits still remain the most wonderous and devastating of attacks. For years, security analysts have been playing with exploits that yield them a rootshell. The Exploit Laboratory brings the "rocket science" of reverse engineering and exploit writing in an easy to understand two day class at Hack In The Box 2008.
Started by Saumil Shah of Net-Square and S.K. Chong of Scan Associates, the Exploit Laboratories has been taught at Blackhat, Hack in the Box, CanSecWest and many other security conferences worldwide to sold-out audiences.

The class' popularity lies in the fact that it brings the concepts down to easy hands-on examples featuring real life software as opposed to contrived textbook examples. Participants begin with simple overflows on Windows and Linux and are brought up to speed with exception handler overwrites, heap overflows, exploiting toolbars on IE7, bypassing Vista ASLR, and more, featuring recent software vulnerabilities out in the wild.

For the first time this year, the Exploit Laboratory features hands on Mac OS X exploitation. Saumil and S.K. strive to keep the class current. Things have come a long way since the class was first offered in early 2006. The Exploit Laboratory has kept pace with the times, with a continually updated syllabus and up-to-date examples of vulnerabilities.

It entirely depends upon the participants how much they wish to absorb out of the class. Both instructors are highly experienced security professionals with over nine years of experience in the industry, many public contributions, books and papers. The format of the Exploit Laboratory is "learn as you play along". Participants are expected to bring their own laptops to class. Everything happens hands-on.

The Exploit Laboratory requires its participants to sign a code of ethics agreement to promote vulnerability discovery and responsible disclosure.
Some comments from past students on The Exploit Laboratory:

Garrett Gee writes: "Wow, what a weekend I just had. I just finished the exploit laboratory class with Saumil Shah and S.K. Chong at Black Hat USA 2007. We covered exploit topics like stack and heap overflows on linux and windows systems. At the end of the course, I think we developed ten exploits for various applications. I loved their teaching format of explaining the exploit concept, then stepping us through a real exploit, and then letting us do one ourselves. A major difference from the ImmunitySec course I took a few years ago was that they told us how to make the application crash in the first place. This saved lots of time and allowed us to focus on how to gain full control of the application, and how to pack our payloads."

http://garrettgee.com/2007/07/30/black-hat-exploit-laboratory/

Tate Hansen writes: "If you want to bump up your exploit writing skills – Saumil Udayan Shah is an excellent teacher. His style of teaching brought out memories of my time as an ECE student at CU, Boulder. He presented very clearly, kept the pace moving, and quipped often. Great class. The majority of time is spent on using GDB and WinDBG to inspect Intel 32-bit x86 CPU registers for opportunities. The end game was always accompanied by netcat and metasploit (along with a decent amount of scripting to facilitate quick retries when trying to line up all the exploit code to ensure success)."

http://blog.clearnetsec.com/articles/2006/08/07/the-exploit-laboratory-class-at-blackhat-training-was-great

==

More details on the class can be found on the Hack In The Box 2008 conference page at: http://conference.hitb.org/hitbsecconf2008kl/

# END #

Hack In The Box (HITB) is the owner and organiser of HITBSecConf, the largest network security conference in Asia and the Middle East. The event is endorsed by the Malaysian Communications and Multimedia Commission (MCMC),the Malaysian Administrative Modernisation & Management Planning Unit (MAMPU)., Malaysian National Computer Confederation (MNCC) and the Malaysian Multimedia Development Corporation (MDeC).

Ms. Belinda Choong
Hack In The Box (M) Sdn. Bhd.
Suite 26.3, Level 26, Menara IMC,
No. 8 Jalan Sultan Ismail, 50250, Kuala Lumpur,
Malaysia.

Tel: +603-20394724
Fax: +603-20318359

This release was published on openPR.

Permanent link to this press release:

Copy
Please set a link in the press area of your homepage to this press release on openPR. openPR disclaims liability for any content contained in this release.

You can edit or delete your press release The Exploit Laboratory 3.0 comes to Hack In The Box 2008 here

News-ID: 53711 • Views:

More Releases from Hack In The Box

Facebook Chief Security Officer to Keynote 2nd Annual HITB Security Conference in Europe
Facebook Chief Security Officer to Keynote 2nd Annual HITB Security Conference i …
Utrecht, The Netherlands, 02 March 2011 - After the success of last year’s inaugural event, Hack In The Box Security Conference is taking over the Krasnapolsky once again from the 17th till the 20th of May. This deep knowledge security conference brings a unique mix of security professionals, researchers, law enforcement and members of the hacker underground under one roof, with the focus of discussing new and groundbreaking attack and

More Releases for Exploit

PROXIA Solution Days 2025 - Experience MES live and exploit potentials
With the PROXIA Solution Days 2025, PROXIA Software AG invites manufacturing companies to a compact, practice-oriented event format dedicated entirely to the digital transformation of production. On three dates in Germany and Switzerland, participants will have the opportunity to experience modern MES (Manufacturing Execution Systems) solutions live and receive specific answers to their individual challenges. Digital production needs the right system In times of Industry 4.0, increasing efficiency requirements and growing competitive
Berkeley Bans AI Rent Pricing Algorithms; Bartlett Calls for Technology to Empow …
[Corrected] For Immediate Release: Berkeley Bans AI Rent Pricing Algorithms; Bartlett Calls for Technology to Empower, Not Exploit Communities [Update - March 27, 2025] Berkeley, CA ⁠⁠ - On Tuesday (March 12, 2025), the Berkeley City Council took a historic step by banning AI-driven rent-pricing algorithms, marking a critical move to protect renters and address soaring housing costs. Vice Mayor Ben Bartlett praised the decision while emphasizing the broader responsibility to ensure AI
Global Measuring Tape Market 2019 - Endura, Hultafors, EXPLOIT, PST
A Measuring Tape or tape measure is a flexible ruler. It consists of a ribbon of cloth, plastic, fiber glass, or metal strip with linear-measurement markings. It is a common measuring tool. Its design allows for a measure of great length to be easily carried in pocket or toolkit and permits one to measure around curves or corners. Today it is ubiquitous, even appearing in miniature form as a keychain
Antimicrobial Textiles Market - Exploit growth opportunities 2025 | Sciessent LL …
Antimicrobial Textiles Market: Snapshot The global antimicrobial textiles market has exhibited steady growth in the last few years and considering its relatively recent emergence, the growth rate of the market is also promising. The consistent demand for antimicrobial textiles from consumers has been facilitated by the comfort they provide by eliminating the risk of microbial contamination through clothing. Bacterial and fungal infections represent a significant risk for the skin and can
‘Exploit Kits are the Latest Weapons of Cyber Destruction’, Warns Security E …
DUBAI, United Arab Emirates, 4 February, 2013: Malware is a business; people make their living writing and distributing it. Exploit kits are an effective and streamlined methodology of distributing malware; they allow the ‘Bad Guys’ to distribute payloads at a higher level than we have seen in the past. For this reason we've seen exploit kits grow in popularity over the last few years. Chris Larsen, Malware Research Team Leader at
Engage Invest Exploit Meets Social Virtual & Online - With Huzutech
Virtual worlds creator Huzutech will be present, pitching and proud at the 2011 Engage Invest Exploit event, which takes place on May 19th at Edinburgh University's prestigious School of Informatics. Having beaten off competition from hundreds of young, high growth companies across Scotland, Huzutech will be introducing investors, venture capitalists and business experts from around the world to the company's unique mix of social networking, virtual worlds and multiplayer games technology