![dev bootcamp dev bootcamp](https://live.staticflickr.com/7495/16029705607_a42fe128c4_b.jpg)
Hands down, this is the best security training I attended.Įvery step is explained with backing theory and clear logical reasons on why we were doing what we were doing to create the exploits. What separate Peter from other instructors is his methodological and logical approach in delivering the course materials. Many thanks Peter!įirst I would like to start by thanking Peter for his patience and dedication to answer every question in great details. I am very glad that I had the opportunity to attend the Advanced Course, and I would definitely attend any other future training done by Peter. Peter has been a truly inspiring mentor during the course and made everything possible to ensure that the core concepts are understood by the whole class.
DEV BOOTCAMP SOFTWARE
Personally, the real journey begins after the end of this training, as Peter provided the tools/ ideas/ examples/ thought-process/ inspiration for further research on the exciting path of modern software exploitation. We explored proof of concepts of Use-After-Free conditions, Memory Leaks, Heap Feng Shui and precise Heap Spraying by performing quite intense, long, and instrumental labs. We delved into how heap management works, and leveraging its functionality to exploit bugs mainly in browser software. I had previously attended the Bootcamp training, with the intention to continue with the Advanced course so as to level-up my skills, but more importantly to improve my thought processes into exploit development. Peter managed to exceed my expectations that I had out of this course.