Areas Covered
- Network-based attacks
- Cryptography-based attacks
- Escalation and client-side attacks
- Handling restricted environments
- Scapy, fuzzing, and source code analysis
- Shellcode and memory basics
- Windows and Linux stack overflows
- Defeating advanced stack protections on Windows and Linux
Who is GXPN for?
- Network Penetration Testers
- Systems Penetration Testers
- Incident Handlers
- Application Developers
- IDS Engineers
- Security personnel responsible for assessing target networks, systems and applications to find vulnerabilities
GXPN with CyberLive
GIAC knows that cyber security professionals need:
- Discipline-specific certifications
- Practical testing that validates their knowledge and hands-on skills
In response to this industry-wide need, GIAC developed CyberLive - hands-on, real-world practical testing.
CyberLive testing creates a lab environment where cyber practitioners prove their knowledge, understanding, and skill using:
- Actual programs
- Actual code
- Virtual machines
Candidates are asked practical questions that require performance of real-world-like tasks that mimic specialized job roles.
Exam Format
- 1 proctored exam
- 60 questions
- 3 hours
- Minimum passing score of 67%
Delivery
NOTE: All GIAC Certification exams are web-based and required to be proctored. There are two proctoring options: remote proctoring through ProctorU, and onsite proctoring through PearsonVUE. Click here for more information.
GIAC certification attempts will be activated in your GIAC account after your application has been approved and according to the terms of your purchase. Details on delivery will be provided along with your registration confirmation upon payment. You will receive an email notification when your certification attempt has been activated in your account. You will have 120 days from the date of activation to complete your certification attempt.
Exam Certification Objectives & Outcome Statements
- Bypassing Linux Exploit Mitigations The candidate will be able to identify Linux stack protections and recognize how to bypass them.
- Bypassing Windows Memory Protections The candidate will be able to identify Windows stack protections and describe how to bypass them.
- Endpoint Control Evasions and Escalation The candidate will be able to apply an array of techniques to bypass and break out of common endpoint protections and restrictions.
- Establishing Network Access The candidate will demonstrate knowledge in enumeration and bypass of common network access controls used to obtain initial connectivity.
- Infrastructure Manipulation and Exploitation The candidate will demonstrate an understanding of how routing and traffic control can be influenced to exploit networks.
- Linux Execution, Memory, and Shellcode Foundations The candidate will be able to describe Linux memory organization and management fundamentals, low-level Linux binary execution, and how to leverage this information with shell code.
- Network Interception and Traffic Manipulation The candidate will be able to describe the process of intercepting, observing, and altering traffic flows.
- Practical Cryptography The candidate will be able to identify issues in cryptographic implementations and different ways to exploit those implementations.
- Practical Scripting for Offensive Operations The candidate will be able to create new, and adapt existing, small objective-focused, scripts.
- Product Security Testing and Fuzzing Foundations The candidate will be able to build fuzzing grammars and know when and how to use them.
- Return Oriented Stack-Based Exploits The candidate will be able to create simple return-oriented chains to achieve execution.
- Source Code Based Fuzzing Techniques The candidate will be able to demonstrate the use of available source code to improve fuzzing efficiency and ensure greater code coverage.
- Windows Execution and Memory Foundations The candidate will be able to describe the low-level Windows execution process as well as run-time and execution-time protections.
- Windows Overflows and Execution Control The candidate will be able to demonstrate how execution control can be gained by leveraging internal Windows mechanisms, such as structured exception handling.
Other Resources
- Training is available in a variety of modalities including live training and OnDemand
- Practical work experience can help ensure that you have mastered the skills necessary for certification
- College level courses or self paced study through another program or materials may meet the needs for mastery.
- Get information about the procedure to contest exam results.
Practice Tests
- These tests are a simulation of the real exam allowing you to become familiar with the test engine and style of questions.
- Practice exams are a gauge to determine if your preparation methods are sufficient.
- The practice bank questions are limited so you may encounter the same question on practice tests when multiple practice tests are purchased.
- Practice exams never include actual exam questions.
- Purchase a GXPN practice test here.
- GIAC recommends leveraging additional study methods for test preparation.