As companies are getting more and more conscious of having their internal programs binary audited and reverse
engineered, penetration testers are required to spot vulnerabilities in compiled code and test their impact by writing custom exploits for these vulnerabilities.
The Exploit Laboratory takes the hacker's approach in demonstrating how seemingly trivial errors and vulnerabilities can be exploited with astonishing results.
Just because an exploit is not publicly available on sites such as Security Focus, doesn't mean that the vulnerability cannot or is not being exploited. The
Exploit Laboratory Training program begins with an introduction to vulnerabilities in binary code and goes through a systematic process of debugging, reverse
engineering and writing a working exploit for these vulnerabilities.