For upcoming training dates, please inspect the Trainings entry in the navigation pane.

Source Code Audit Training

Reading source code is like the x-ray goggles of hacking. The more you are able to see, the more bugs may appear under the hood.

You might be a proficient Penetration Tester or a skilled Bug Bounty Hunter without ever doing a source code assessment. But, if you like to broaden your horizon with source code reviews to identify bugs in source code, this is the training you are looking for.

This training aims to enable the participants to perform source code assessments on managed languages. In order to teach the general aspects of source code audits, as well as the identification and exploitation of vulnerabilities, the training will follow a language agnostic approach. Managed languages covered in this training include:

  • PHP
  • Java
  • .NET
  • Python
  • Ruby
  • Go

The general concepts and key take-aways of this training, however, are independent from specific languages.

Who should Attend

Penetration Testers, Bug Bounty Hunters, Developers or anyone else interested in finding (and exploiting) flaws in Software by reading the respective sources.

Key Learning Objectives

  • Language agnostic code audit approaches
  • Recognition of common patterns leading to vulnerabilities
  • Recognition of vulnerabilities caused by erroneously used interfaces
  • Handling of vast code bases
  • Creation of PoCs exploits based on code audits

Prerequisite Knowledge

  • Reasonable IT security background (e.g. penetration tests, bug bounties, etc.)
  • Reasonable programming experience in at least one managed language

Agenda (preliminary)

Day 1 - Introduction and Basics:

  • Opening and Introduction
  • Code audit toolchain set-up
  • Patterns and idioms in source code which enable vulnerabilities
  • Practical exercises

Day 2 - Advanced Topics:

  • Underhanded vulnerabilities
  • Tackling large code bases
  • Interface / environment considerations
  • Practical exercises

Day 3 - PoC Creation:

  • Verification of findings
  • Creation of simple triggers
  • Creation of working PoC exploits
  • Practical exercises
  • Final practical exercises on real-world code bases