We will not teach you how to run Nessus and Nmap, nor tell you to have a SNMP policy.

We will teach you to write exploits and how to attack.

Linux Kernel Exploitation

The Immunity Linux Kernel Exploitation class focuses on modern exploit development and vulnerability discovery techniques. Intermediate to advanced exploit development skills are recommended for students wishing to this class.

For additional information or pricing quotes please send an email to .

Linux Kernel Exploitation Syllabus *

Day One

  • User Land vs Kernel Land
  • Introduction to the Kernel Land
  • Kernel Debugging Environment
  • Kernel Internals

Day Two

  • Memory Models and the Address Space
  • Kernel Shellcodes
  • Taxonomy of Kernel Vulnerabilities
  • Arbitrary Kernel Read/Write

Day Three

  • Kernel Heap Allocators (SLAB/SLUB)
  • Kernel Pool Overflows and Use-After-Free
  • Race Conditions

Day Four

  • Logical and HW-related Bugs
  • Kernel and Hardware Protections
  • Bypassing Protections
  • The Future of Kernel Vulnerabilities

* class syllabus is subject to change

(ISC)2 CPE CREDIT INFORMATION

All of Immunity's training courses offer Continuing Professional Education (CPE) credits.
If you are interested in earning credits, just let Immunity know in advance.

COURSE * CPE CREDITS CERTIFICATIONS
Web Hacking 28 CISSP, CSSLP, SSCP
Linux Kernel Exploitation 28 CISSP, CSSLP, SSCP

* Total potential credits

LATEST IN

IMMUNITYMEDIA

TWITTER
VIDEOS
PRODUCT
BLOG
SERVICES
BLOG
Visit @immunityinc on Twitter