In-person or virtual trainings available from Dark Mentor partners.
3 day class covering RISC-V RV32I/RV64I assembly, including the “M” extensions. Class is built on Linux with a QEMU RISC-V emulated environment, with code debugged by GDB. Option also exists to use real RISC-V hardware. Option also exists to use Ghidra Software Reverse Engineering (SRE) tool as a debugger.
Variable-length class (1-5 days). This class teaches how to find vulnerabilities in source code, and then how to prevent, detect, or mitigate them. The class teaches vulnerability pattern recognition by walking students through real CVEs. The class structure was originally created for Apple’s internal training for their developers when Xeno worked there.
2 day class covering Intel x86-64 firmware. Class is focused on exploring the baseline security mechanisms provided by Intel to protect the Serial Peripheral Interface (SPI) flash chip where the Unified Extensible Firmware Interface (UEFI) Basic Input Output System (BIOS) is stored on modern systems.
2 day class covering Intel x86-64 OS Internals like privilege rings, model-specific registers (MSRs), segmentation, paging, system calls, interrupts, port IO, and breakpoints. Class is run in Windows with WinDbg-based kernel debugging.
3 day class covering Intel x86-64 assembly. Includes options to run with Windows and WinDbg or Linux and GDB. Option also exists to use Ghidra Software Reverse Engineering (SRE) tool as a debugger.