Skip to content

Commit

Permalink
Update README.md
Browse files Browse the repository at this point in the history
  • Loading branch information
ashemery authored Mar 28, 2019
1 parent bd26af1 commit 713e9ee
Showing 1 changed file with 14 additions and 15 deletions.
29 changes: 14 additions & 15 deletions README.md
Original file line number Diff line number Diff line change
@@ -1,29 +1,28 @@
# exploitation-course
Offensive Software Exploitation Course

This repository is for the Offensive Software Exploitation Course I am teaching at Champlain College.

Most of the slidenotes I used, are already shared on Opensecuritytraining.info, but the labs were fully created by me. I used publically available resources and software to explain each of the weakneses covered, so there is nothing here that you cannot find online.

Vulnerable Software:
**Vulnerable Software:**
The vulnerable software I used are also online and can be found at exploit-db.com.

Tools used:
**Tools used:**
1. Immunity Debugger
2. Kali Linux

Targets used:
**Targets used:**
1. Download any Windows 10 VM from Microsoft VMs. This was used for most of the labs, except for the EggHunter lab, I used a Windows 7 VM, also from Microsoft.


Course modules:
Module 01 - The Basics (PE Format, DLLs, etc)
Module 02 - Bug Hunting and Fuzzing
Module 03 - Intro. to Memory Corruption and Buffer Overflows
Module 04 - Metasploit
Module 05 - Mitigation Techniques
Module 06 - SEH and Jumping Strategies
Module 07 - Egghunter
Module 08 - Retrurn Oriented Programming (ROP)
Module 09 - Post Exploitation
Module 10 - Manual Code Injection
**Course modules:**
- Module 01 - The Basics (PE Format, DLLs, etc)
- Module 02 - Bug Hunting and Fuzzing
- Module 03 - Intro. to Memory Corruption and Buffer Overflows
- Module 04 - Metasploit
- Module 05 - Mitigation Techniques
- Module 06 - SEH and Jumping Strategies
- Module 07 - Egghunter
- Module 08 - Retrurn Oriented Programming (ROP)
- Module 09 - Post Exploitation
- Module 10 - Manual Code Injection

0 comments on commit 713e9ee

Please sign in to comment.