G7bruijzsoqdjfnrprhq

Immunity Debugger for Exploit Devs - YCSC Lab Essentials

Learn Immunity Debugger in and out.

   Watch Promo

What you'll learn
  • Basics of Immunity Debugger
  • Get familiar with various Views / Windows
  • Stack operations available in Immunity Debugger
  • Disassembler operations available in Immunity Debugger
  • Get started with PyCommands & Mona Library
  • Just-in-time debugging with Immunity Debugger
  • How to set breakpoints, step through and trace
  • Immunity Debugger command line
Requirements
  • Familiarity with Assembly Language (good to have)
  • Understanding of x86 CPU architecture (registers, flags, stack etc.)
Description

Immunity Debugger is the go to debugger for most security professionals. Immunity Inc describes it as a powerful new way to write exploits, analyze malware, and reverse engineer binary files. It builds on a solid user interface with function graphing, the industry's first heap analysis tool built specifically for heap creation, and a large and well supported Python API for easy extensibility.

This course covers both, well-known and lesser-known, features of Immunity Debugger. Few of the key topics discussed in this course are as follows:

  • Download and Installation
  • Views
  • Stack Operations
  • Disassembler Operations
  • Breakpoints, stepping through, tracing etc.
  • PyCommands and Mona Library
  • Just-in-time debugging
  • ... and a lot more

A good understanding of Immunity Debugger comes in handy while exploit development, backdooring PE files, encoding files for anti-virus evasion. Once you have completed this course, you will be a lot more comfortable with Immunity Debugger and you'll know which features to use to perform each of the previously mentioned activities.

Since other debuggers like Ollydbg (Olly debug), evans debug etc. have a similar interface, through this course you can learn how to use them as well. I have created this course with the vision that it becomes your go to reference guide for Immunity Debugger and other similar debuggers.

Who this course is for:
  • Cyber security professionals
  • Reverse Engineers
  • Beginners in Exploit Development
  • Security Researchers / Engineers/ Analysts


Your Instructor


Uday Mittal
Uday Mittal

Uday Mittal (OSCE, OSCP, CISSP, CISA, CISM, DCPP) is the founder of Yaksas CSC. He has over 6 years of experience in dealing with various issues related to cyber security. He is actively working towards educating people on cyber security risks and steps to mitigate them. His areas of interest include exploitation research, malware analysis, red teaming, VAPT etc.


Course Curriculum


  Introduction
Available in days
days after you enroll
  Download and Installation
Available in days
days after you enroll
  Loading a file
Available in days
days after you enroll
  CPU Window
Available in days
days after you enroll
  Execution Controls
Available in days
days after you enroll
  Immunity Debugger Views
Available in days
days after you enroll
  Immunity Debugger Stack Operations
Available in days
days after you enroll
  Immunity Debugger Command line, PyCommands & Mona Library
Available in days
days after you enroll
  Just in time Debugging
Available in days
days after you enroll
  Miscellaneous Features
Available in days
days after you enroll
  Conclusion
Available in days
days after you enroll

Frequently Asked Questions


When does the course start and finish?
The course starts now and never ends! It is a completely self-paced online course - you decide when you start and when you finish.
How long do I have access to the course?
How does lifetime access sound? After enrolling, you have unlimited access to this course for as long as you like - across any and all devices you own.
What if I am unhappy with the course?
We would never want you to be unhappy! If you are unsatisfied with your purchase, contact us in the first 30 days and we will give you a full refund.

Get started now!