Android Kernel Fuzzing & Exploitation
Limited Pre-Sale 

With 90 Days Lab Access + Exam 
(Pre-sale comes with unlimited lab time until all course videos are fully live)


Welcome to our Android Kernel Course!

In this course, we'll introduce you to the world of Android kernel exploitation techniques employed by threat actors.

We'll begin with the fundamentals of an Android (Linux) Kernel where you will learn how to build and emulate a kernel, and cover the internals like user space and kernel space, memory management, allocators and drivers.  You will also learn how to develop a kernel driver.

In the Vulnerability Discovery section different type of kernel vulnerabilities will be covered and you will find vulnerabilities using fuzzing and reproduce crashes related to real-world examples (CVEs). In the Exploitation part you will build full chain exploits using different modern techniques (data only attacks, rop/jop chains, heap feng shui, heap reallocation etc.)

By the course's conclusion, you'll possess the skills to identify kernel vulnerabilities through reverse engineering and fuzzing, enabling you to craft complete full chain exploits that effectively bypass security measures and remotely root a device. 

WHAT YOU GET

Included in Your Course

43 Labs for Hand-On Practice

Explore our cutting-edge lab experience, where you'll dive deep into the realm of Mobile Hacking. Fueled by advanced Android devices operating on arm64 architecture, our lab combines cutting-edge technology with real-world challenges.

7 Modules

Our course offers a comprehensive understanding of Android kernel exploitation and fuzzing, starting with kernel fundamentals and ending with exploitation where you build a full chain exploit for real CVEs.

Certification

After successfully completing the course and passing the exam, you'll receive a prestigious certification, validating your expertise in Android Kernel Fuzzing and Exploitation.

Advanced Fuzzing Techniques

Join our course to learn vulnerability research on Android Kernel drivers. Master skills like identifying target functions, creating fuzzing harnesses, and employing various fuzzing techniques. Explore real-world examples of kernel fuzzing using Syzkaller.

Mobile Exploit Development

Our course teaches vulnerability identification, debugging, and exploit creation. We cover various vulnerability types like out of bound read and write, and different exploit techniques like Cred overwrite, heap feng shui etc.

Cloud VMs at Your Service

We offer a training course with Cloud Virtual Machines (VMs) for a smooth learning experience. Regardless of your machine type, you can easily access the course. Focus on mastering your skills while we handle the technicalities. Train with confidence, knowing that we've sorted out the tech side for you!

Course Structure

Guaranteed Security using one of the most advanced encrypted systems on the market.
The information in this page is being processed and encrypted securely using industry-leading encryption and fraud prevention tools.