Immunity Debugger for Exploit Devs
Learn Immunity Debugger in and out. You will learn both, well-known and lesser-known, features.
Immunity Debugger is powerful when it comes to writing exploits, analyzing malware and reverse engineering binary files. It is the debugger of choice for most security professionals. It has a rich user interface with function graphing and a heap analysis tool built specifically for heap creation. It is shipped with Python API for easy extensibility.
This course covers Immunity Debugger in and out. You will learn both, well-known and lesser-known, features. A few topics taught in this course are as follows:
Download and Installation
Views
Stack Operations
Disassembler Operations
Breakpoints, stepping through, tracing etc.
PyCommands and Mona Library
Just-in-time debugging
... and a lot more
Immunity Debugger is extremly useful while creating exploits, backdooring PE files, encoding binaries to evade anti-malware software. Therefore, a good understanding of this tool is must for security professionals, specially for people studying for security certifications from Offensive Security (OSCP, OSCE, OSED etc.), eLearnSecurity (ePTP, ePTX etc.) and various other organizations.
I have created this course with the vision that it becomes your go to reference guide for Immunity Debugger and other similar debuggers (Ollydbg, Evans debugger etc).
This is a FREE course and you can enrol here.
Who this course is for:
- Cyber security professionals
- Reverse Engineers
- Beginners in Exploit Development
- Security Researchers / Engineers/ Analysts
What you’ll learn
- Basics of Immunity Debugger
- Get familiar with various Views / Windows
- Stack operations available in Immunity Debugger
- Disassembler operations available in Immunity Debugger
- Get started with PyCommands & Mona Library
- Just-in-time debugging with Immunity Debugger
- How to set breakpoints, step through and trace
- Immunity Debugger command line
Requirements
- Familiarity with Assembly Language (good to have)
- Understanding of x86 CPU architecture (registers, flags, stack etc.)
Note: This website is not associated or owned by Immunity Inc. Immunity Debugger logo is a copyright of Immunity Inc. and is used here for representational purposes only.