Virtual Training

9 posts
Latest posts
TEEPwn: Breaking TEE By Experience
Virtual Training

TEEPwn: Breaking TEE By Experience

Trusted Execution Environments (TEEs) are challenging to secure due to complex hardware and large trusted code bases. Vulnerabilities have been exploited via the less-secure Rich Execution Environment (REE). TEEPwn features a CTF experience to explore TEE vulnerabilities and exploits.
3 min read
Exploiting the Linux Kernel
Virtual Training

Exploiting the Linux Kernel

This training guides through the field of Linux kernel exploitation. In a series of practical labs, the training explores the process of exploiting kernel bugs in a modern Linux distribution on the x86-64 architecture.
3 min read
The ARM64 Exploit Laboratory
Virtual Training

The ARM64 Exploit Laboratory

An ideal introduction to vulnerability exploitation on 64-bit ARM Linux platform, spanning from ARM64 assembly all the way to ARM64 Return Oriented Programming (ROP). An ideal step up from the 32-bit ARM Exploit Laboratory.
4 min read
Windows Kernel Exploitation: Foundation and Advanced
Virtual Training

Windows Kernel Exploitation: Foundation and Advanced

Gain hands-on experience in a wide range of topics, including Windows and driver internals, various memory corruption types, exploit development techniques, mitigation bypass techniques, pool internals, and Feng-Shui and then test your skills in a CTF challenge!
4 min read
Rust Reverse Engineering in Practice
Virtual Training

Rust Reverse Engineering in Practice

This training equips you with essential skills in Rust reverse engineering. You’ll learn to analyze Rust binaries, understand the language’s compilation and runtime intricacies, utilize tools and plugins, and tackle advanced challenges such as obfuscation and malware analysis.
5 min read
Great! Next, complete checkout for full access to Ringzer0
Welcome back! You've successfully signed in
You've successfully subscribed to Ringzer0
Success! Your account is fully activated, you now have access to all content
Success! Your billing info has been updated
Your billing was not updated