The Corelan Bootcamp teaches both basic & advanced techniques to write reliable exploits for the Win32 platform. The trainer will share his “notes from
the field” and various tips & tricks to become more effective at
This hardcore hands-on course will provide
students with a solid understanding of current Win exploitation techniques and memory protection bypass techniques.
Students should be:
able to read simple C code and simple scripts
familiar with writing basic scripts using python/ruby/…
ready to dive into a debugger and read asm for hours and hours and hours
ready to think out of the box and have a strong desire to learn
fluent with managing Windows / Linux operating system and with using vmware workstation/virtualbox
familiar with using Metasploit
No prior knowledge of assembly is required, but it will certainly help if you have some basic knowledge.
case you’re wondering: if you took OSCP/OSCE, and understood the
exploitation part of the courses, then you are probably ready for the
Important Students will receive the exact installation instructions after registration, about a week before class begins, so don’t start installling the VMs yet.
Students are required to sign a confidentiality agreement at the start of
the course. You will not be admitted to the course without signing this
document. You can find a copy of the document here
Peter Van Eeckhoutte is the founder of
Corelan Team and the author of the well-known tutorials on Win32 Exploit
Development Training, available at https://www.corelan.be.
The team gathers a group of IT Security enthusiasts and researchers
from around the world, who all share common interests : doing research,
gather & share knowledge, and perform responsible/coordination
disclosure. Above all, the team is well known for their ethics and their
dedication to helping other people in the community.
Together with the team, he has developed and published numerous
tools that will assist pentesters and exploit developers, and published
whitepapers/video’s on a wide range of IT Security related topics
(pentesting tools, (malware) reverse engineering, etc).