Path Traversal to Arbitrary File Writes
Discover path traversal vulnerabilities in Android application components. Chain them to achieve arbitrary file writes to controlled locations on the device filesystem.
Taught by Ken Gannon, 3x Pwn2Own winner (2023–2025) and Head of Vulnerability Research at MHL. Build a complete 3-phase, 11-link exploit chain against a Samsung Galaxy S8 — from path traversal to full device compromise. Pre-configured virtual labs. No hardware.
You can find bugs. You can run MobSF. You can write a CVSS score. But when it comes to actually building an exploit chain — chaining path traversals into file writes into device compromise — you're stuck.
Pwn2Own winners don't stop at "identified a vulnerability." They chain 8 bugs and 3 OS features into a full-device takeover. That's what this course teaches.
Build the exact Samsung Galaxy S8 exploit chain that wins Pwn2Own. 3 phases, 11 links, start to finish. Every bug explained. Every link built. Every technique hands-on in a pre-configured virtual lab.
Taught by Ken Gannon, who actually won Pwn2Own with these techniques. Not theory. Not slides. Working exploits.
Ken Gannon introduces the Advanced Android Hacking course and the 11-link Samsung Galaxy S8 exploit chain you'll build from scratch.
The Pwn2Own journey and how this course builds the skills to compete at the world's top hacking competition.
Tour of the pre-configured virtual lab environments where you'll develop and test exploits on real Android device images.
Discover path traversal vulnerabilities in Android application components. Chain them to achieve arbitrary file writes to controlled locations on the device filesystem.
Leverage the file write primitive to force-install a malicious application package. Trigger a device reboot to activate the payload and establish persistence.
Complete the chain through browser-based interaction to achieve full device compromise. Exfiltrate data, demonstrate impact, and document the entire chain end-to-end.
| Capability | MHL AAH | SANS SEC575 | Udemy |
|---|---|---|---|
| Real exploit chains | ✓ 11-link Samsung chain | ✗ Overview only | ✗ Not covered |
| Virtual labs | ✓ Pre-configured VMs | ✗ Physical device | ✗ Video-only |
| 1:1 Mentorship | ✓ Video sessions | ✗ | ✗ |
| Hands-on labs | ✓ 100% lab-based | Lecture-heavy | Video-only |
| Certification included | ✓ Exam included | GIAC extra ($900+) | ✗ |
| Price | €500 (33% off) | $8,000+ | $15–$200 |
* Based on publicly available curriculum information as of 2026. Competitor features subject to change.
6 modules. 11 chain links. From path traversal to full device compromise — every step hands-on in your virtual lab.
Taught by Ken Gannon · Pwn2Own winner 2023–2025
€500 instead of €750. Course, 90-day labs, certification exam, 1:1 mentorship — all included. Taught by Ken Gannon, 3x Pwn2Own winner. Use code AAH-MAR-33.