-
Notifications
You must be signed in to change notification settings - Fork 385
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
1 changed file
with
14 additions
and
15 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,29 +1,28 @@ | ||
# exploitation-course | ||
Offensive Software Exploitation Course | ||
|
||
This repository is for the Offensive Software Exploitation Course I am teaching at Champlain College. | ||
|
||
Most of the slidenotes I used, are already shared on Opensecuritytraining.info, but the labs were fully created by me. I used publically available resources and software to explain each of the weakneses covered, so there is nothing here that you cannot find online. | ||
|
||
Vulnerable Software: | ||
**Vulnerable Software:** | ||
The vulnerable software I used are also online and can be found at exploit-db.com. | ||
|
||
Tools used: | ||
**Tools used:** | ||
1. Immunity Debugger | ||
2. Kali Linux | ||
|
||
Targets used: | ||
**Targets used:** | ||
1. Download any Windows 10 VM from Microsoft VMs. This was used for most of the labs, except for the EggHunter lab, I used a Windows 7 VM, also from Microsoft. | ||
|
||
|
||
Course modules: | ||
Module 01 - The Basics (PE Format, DLLs, etc) | ||
Module 02 - Bug Hunting and Fuzzing | ||
Module 03 - Intro. to Memory Corruption and Buffer Overflows | ||
Module 04 - Metasploit | ||
Module 05 - Mitigation Techniques | ||
Module 06 - SEH and Jumping Strategies | ||
Module 07 - Egghunter | ||
Module 08 - Retrurn Oriented Programming (ROP) | ||
Module 09 - Post Exploitation | ||
Module 10 - Manual Code Injection | ||
**Course modules:** | ||
- Module 01 - The Basics (PE Format, DLLs, etc) | ||
- Module 02 - Bug Hunting and Fuzzing | ||
- Module 03 - Intro. to Memory Corruption and Buffer Overflows | ||
- Module 04 - Metasploit | ||
- Module 05 - Mitigation Techniques | ||
- Module 06 - SEH and Jumping Strategies | ||
- Module 07 - Egghunter | ||
- Module 08 - Retrurn Oriented Programming (ROP) | ||
- Module 09 - Post Exploitation | ||
- Module 10 - Manual Code Injection |