Skip to content

ashemery/exploitation-course

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 

Repository files navigation

exploitation-course

Offensive Software Exploitation Course This repository is for the Offensive Software Exploitation Course I am teaching at Champlain College.

Most of the slidenotes I used, are already shared on Opensecuritytraining.info, but the labs were fully created by me. I used publically available resources and software to explain each of the weakneses covered, so there is nothing here that you cannot find online.

Vulnerable Software: The vulnerable software I used are also online and can be found at exploit-db.com.

Tools used:

  1. Immunity Debugger
  2. Kali Linux

Targets used:

  1. Download any Windows 10 VM from Microsoft VMs. This was used for most of the labs, except for the EggHunter lab, I used a Windows 7 VM, also from Microsoft.

Course modules:

  • Module 01 - The Basics (PE Format, DLLs, etc)
  • Module 02 - Bug Hunting and Fuzzing
  • Module 03 - Intro. to Memory Corruption and Buffer Overflows
  • Module 04 - Metasploit
  • Module 05 - Mitigation Techniques
  • Module 06 - SEH and Jumping Strategies
  • Module 07 - Egghunter
  • Module 08 - Retrurn Oriented Programming (ROP)
  • Module 09 - Post Exploitation
  • Module 10 - Manual Code Injection