| Venue | Virtual - Training Platform |
| Instructor / SME Access | 30 Days |
| Training VM Access | 90 Days (Cloud Hosted) |
| Expected Completion Time | 1-2 Weeks (Full Time) 2-4 Weeks (Part Time) |
| Maximum Group Size | 20 |
| Pricing | $3,499 USD / Seat |
| Venue | Virtual - Training Platform |
| Instructor / SME Access | 30 Days |
| Training VM Access | 90 Days (Cloud Hosted) |
| Expected Completion Time | 1-2 Weeks (Full Time) 2-4 Weeks (Part Time) |
| Maximum Group Size | 20 |
| Pricing | $3,499 USD / Seat |
This is a self-guided and self-paced training.
Students are given access to our training platform which hosts
course materials and facilitates access to training VMs. There are no scheduled livestreams or video sessions; rather
students progress through a series of modules and exercises at their own pace.
Instructors and subject matter experts from RET2 will be available for questions and course-assistance via a private discord
server (shared with other students in the session), on-platform messaging, or over email. We are also happy to accommodate other methods of
assistance upon request.
Please contact us prior to booking a seat if you have any questions about the format
of this training.
Web browsers are among the most utilized consumer facing software products on the planet. As the ubiquitous gateway to the internet, browsers introduce significant risk to the integrity of personal computing devices. In the race to protect users while advancing web technology, premiere browsers have become increasingly complex targets to compromise.
Over the course of this training, students will receive a thorough introduction to the fundamental concepts of vulnerability research as it pertains to modern web browsers. This includes identifying, evaluating, and weaponizing a range of vulnerability patterns via the exploitation of patched, real-world vulnerabilities as well as custom-written, demonstrative examples. Through this, students will experience the end-to-end process of developing memory corruption based exploits against web browsers.
This course will focus specifically on Google Chrome and Apple Safari.
This is an advanced training that assumes familiarity with contemporary vulnerability research topics.
Each user receives their own, personal cloud-hosted Training Virtual Machine. This VM can be started, stopped, and configured directly from the training platform.
Exercises are interspersed throughout the written materials to encourage learning-by-doing. These exercises are integrated into the Training VM and can be launched and debugged with one-line commands.
Multiple prebuilt, pre-patched, and pre-configured engines allow you to focus on learning browser-exploitation. No fighting compilers and manual patch-diffing required!