Instructors: Sina Kheirkhah
Dates: June 23 to 26 2025
Capacity: 25 Seats
You can checkout https://summoning.team/ for a better presentation
of this training
In this 4 day training course, we will be exploiting 15+ remote code execution chains (total of 25
single bugs), these vulnerabilities will all be unique in their style and target real world softwares in
the class, we'll walk you through bypassing mitigation, discovering and chaining complex
vulnerabilities, the tricks and techniques based on each target and many more exciting subjects. This is
going to be 32 hours of intensive reverse engineering and exploitation to develop your intuition for
finding and exploiting bugs in .NET environments.
Day 1: Foundation of .NET Exploitation
Day 2: Advanced .NET Exploitation Techniques
Day 3: Deep Dive into Deserialization Exploitation
Day 4: Exploitation Challenges and Edge Case Bypasses
A good attitude towards learning and basic knowledge of reverse engineering, although the course is about reverse engineering managed code, having prior reversing experience (x86, etc) has a big advantage
Meet Sina Kheirkhah, widely recognized as @SinSinology in the cybersecurity community. Sina is a dedicated full-time vulnerability researcher with a passion for breaking into various systems. From cracking server-side enterprise solutions to targeting hardware and delving into reverse engineering, Sina's expertise covers a wide spectrum. He specializes in low-level exploitation, attacking .NET/Java stacks, bypassing security measures, and chaining bugs seamlessly. Notably, Sina has competed in Pwn2Own for four consecutive years and has won the "Master of Pwn" title as a solo researcher in pwn2own 2025, demonstrating his dedication to the field.
Click here to register.