Course provides knowledge and hands-on experience about exploit development process. Main topics:Essential terms about exploitation (debugger, assembly, fuzzing, crash, vulnerability, exploit, payload, shellcode). Computer and Operating system internals, CPU Registers, Memory architecture, x86 architecture, Buffer overflow, heap oveerflow and spraying, SEH and SEH overflow, Format string vulnerabilities, protection mechanisms and bypass methods, DEP bypass, ASLR bypass, Microsoft EMET, Trapmine and other protection tools.