You are using an unsupported browser. Please update your browser to the latest version on or before July 31, 2020.
close
You are viewing the article in preview mode. It is not live at the moment.
Home > exp-401 advanced windows exploitation > exp-401 advanced windows exploitation

Exp-401 Advanced Windows Exploitation Instant

Let’s pull back the curtain on the hardest technical course in the SANS lineup. You cannot walk into EXP-401 cold. If you have only done web app testing or standard network pentesting (GPEN), you will be lost by lunchtime on Day 1.

Prepare to curse Stephen Sims (the author) under your breath. Prepare to dream in WinDbg hex dumps. Final Verdict EXP-401 is the Black Belt of Windows security. If you want to be a Red Teamer who just runs Cobalt Strike, skip this. If you want to be the person that Microsoft pays a bug bounty to, or the person who builds the exploits that the Red Teamers use— take this course. exp-401 advanced windows exploitation

If you have been in the offensive security space for more than a few years, you know that not all certifications are created equal. Most entry-level certs teach you how to run tools. The SANS Institute’s SEC760: Advanced Windows Exploitation (formerly EXP-401) teaches you how to build the tools —and then break them. Let’s pull back the curtain on the hardest

In the wake of the GIAC Exploit Researcher and Advanced Penetration Tester (GXPN) update, the legacy of EXP-401 remains the gold standard for deep-dive Windows internals. But what is actually inside this "advanced" course, and why does it still haunt the dreams (and CTF victories) of security researchers? Prepare to curse Stephen Sims (the author) under your breath

Was this helpful?
0 out of 2 found this helpful

scroll to top icon