CODEGATE goes beyond CTFs and conferences by offering advanced, hands-on cybersecurity training.
These practical courses offer participants valuable opportunities to strengthen their technical skills,
deepen their understanding of the latest tools and technologies,
and effectively respond to increasingly sophisticated cyber threats.
Notification
All sessions will be conducted in English only.
All sessions will be held in person only.
Registration is available on a first-come, first-served basis.
Confirmation emails will only be sent once the minimum number of attendees is reached.
Details on the payment method will be announced in June and provided exclusively to applicants
All training session attendees will have full access to CODEGATE programs.
Training Sessions
July 8-10, 2025 Ⅰ COEX
Android Userland & Kernel Fuzzing and Exploitation
Android Userland & Kernel Fuzzing and Exploitation
Step into the realm of comprehensive Android security with our integrated "Android Userland and Kernel
Fuzzing and Exploitation" course. Designed for both novices and seasoned professionals, this course offers
an extensive curriculum that covers the spectrum of Android vulnerabilities and their exploitation.
Starting with the Userland component, learners will grasp how to detect bugs in Android Userland
Applications and exploit memory corruptions. The course provides a deep understanding of ARM assembly,
reverse engineering, and the development of robust exploits, bypassing exploit mitigations like NX and ASLR.
With 43 labs across 9 modules, students will employ advanced fuzzing techniques to pinpoint exploitable
vulnerabilities.
The journey continues as we pivot to the Android kernel on the second day, where the secrets of kernel
internals, such as memory allocators and driver programming, are unraveled. Students will learn to discover
bugs using kernel fuzzing techniques, including the use of sanitizers and Syzkaller. The course will guide
attendees through the construction of kernel exploits crucial for sandbox escape, examining real-world
vulnerabilities and the art of kernel debugging.
In culmination, the course integrates Userland and Kernel learnings to assemble a full-chain remote exploit
against target devices. The hands-on approach is further enhanced by access to our
state-of-the-art training platform, where course attendees can perform exercises and apply their knowledge
in practical scenarios.
After the course the students can attempt for the “Certified Android Exploit Developer” exam and will get
access to our Mobile Hacking Lab platform to do extra labs.
Trainers
Umit Aksu
Umit Aksu is a seasoned security engineer and the founder of Mobile Hacking Lab, a leading platform for
offensive mobile security education. He has led security engineering, penetration testing, and vulnerability
research teams at organizations including Microsoft, ING Bank, and DarkMatter. Umit is known for delivering
hands-on trainings at Black Hat USA and Asia, and for regularly sharing technical content on mobile
exploitation and vulnerability research LinkedIn. Currently, Umit is fully focused on developing Djini AI,
an advanced AI-powered vulnerability research platform, and scaling the Mobile Hacking Lab to train the next
generation of offensive security professionals
Arno Miedema
Arno Miedema is a security engineer with a strong background in Application Security, Infrastructure and
Mobile Security and software development (SSDLC). He is involved in the Application Security and the Android
Userland training at Mobile Hacking Lab and was trainer at Blackhat USA. Arno is currently concentrating on
developing AI-powered software solutions, while continuing to specialize in mobile security and
exploitation.
Exchange Rate: 1,429.60 *First announced TT selling rate on 15th, May
Kyle Martin
#Reverse #Engineering #Automation # Vector 35
Skill Level: Intermediate
Overview
This class, for experienced and intermediate reverse engineers, leverages the latest in modern program
analysis theory to simplify and automate many every-day reverse engineering tasks. We'll cover how to model
high-level language patterns and identify them in binaries regardless of target architecture, automate
source-to-sink analysis, detect suspicious binaries, extract key program attributes, and so much more. We'll
discuss how to use automation in long-term reverse engineering projects to automate everyday tasks, keep you
organized, and help you remember what you've already solved. We'll also explore headless scripting to make
quick, automated decisions and reports on binaries at a glance.
Trainers
Kyle Martin
Kyle Martin is a cyber security software engineer and educator, focused on making all things “binary” easier
for humans to understand. Kyle first started teaching at 15 when he became the head counselor at a
summer-long computer camp, rewriting their C++ and x86 assembly courses. More recently Kyle led the body of
students behind CSAW CTF and CSAW Red, including the internal training initiative enabling students to write
the renowned challenges that distinguished those competitions. Now, Kyle runs reverse engineering focused
trainings internationally. Kyle brings with him the expertise and support of the entire Vector 35 team,
creators of Binary Ninja.
- Cancellations made before 5:00 PM (KST) on June 11 are eligible for a full refund.
- No refunds will be provided for cancellations made after 5:00 PM (KST) on June 11.
웹사이트를 원활하게 표시하기 위해 쿠키를 사용합니다. 쿠키란 특정 정보를 저장하기 위해 브라우저를 통해 귀하의 컴퓨터 또는 모바일장치에 저장되는 작은 단위의 데이터입니다.
계속 이용하려면 쿠키 사용에 동의해야 합니다.
쿠키에 대한 더 많은 정보를 보시려면 개인 정보 정책을 확인해주십시오.