Vulnerability Assessment (from Basics to Exploitation)
Tue Jul 9, 2024 9:00 AM - Fri Jul 12, 2024 5:00 PM EDT
20003
Description
This course introduces vulnerability analysis and research with a focus on Ndays. We start with understanding security risks and discuss industry-standard metrics such as CVSS, CWE, and Mitre Attack. Next, we explore the outcome of what a detailed analysis of a CVE contains including vulnerability types, attack vectors, source and binary code analysis, exploitation, and detection and mitigation guidance. In particular, we shall discuss how the efficacy of high-fidelity detection schemes is predicated on gaining a thorough understanding of the vulnerability and exploitation avenues.
Next, we look at the basics of reversing by introducing tools such as debuggers and disassemblers. We look at various bug classes and talk about determining risk just from the title and metadata of a CVE. It will be noted that predicting the severity and exploitability of a vulnerability requires knowledge about the common bug classes and exploitation techniques. To this end, we shall perform deep-dive analyses of a few CVEs that cover different bug classes such as command injection, insecure deserialization, SQL injection, stack- and heap buffer overflows, and other memory corruption vulnerabilities.
Towards the end of the training, the attendee can expect to gain familiarity with several vulnerability types, research tools, and be aware of utility and limitations of detection schemes.
Emphasis
To prepare the student to fully defend the modern enterprise by being aware and equipped to assess the impact of vulnerabilities across the breadth of the application space.
Prerequisites
- Computer with ability to run a virtual machines (recommended 16GB+ memory)
- Some familiarity with debuggers, Python, C/C++, x86 ASM. IDA Pro or Ghidra experience a plus.
**No prior vulnerability discovery experience is necessary
Syllabus
Vulnerability and risk assessment
- Nday risk and patching timelines
- Vulnerability terminology: CVE, CVSS, CWE, Mitre Attack, Impact, Category
- Risk assessment
- Vulnerability mitigation
Binary and code analysis
- Reverse engineering tools such as debuggers, disassemblers
- Deep dive into command injection, SQL injection, insecure deserialization with case studies and hands-on practical.
- Deep dive into buffer overflow and other memory corruption vulnerabilities with case studies and hands-on practical.
Analysis Enrichment
- Qualitative risk assessment
- Patch analysis
- Understanding mitigation techniques
- Writing detection guidance
Location
20003