|4 months ago|
|course/2021||2 years ago|
|labs||8 months ago|
|notes||3 years ago|
|slides||3 years ago|
|CNAME||3 years ago|
|README.md||7 months ago|
|_config.yml||3 years ago|
|index.md||9 months ago|
OFFENSIVE SECURITY & REVERSE ENGINEERING (OSRE) Course
This repository is for the Offensive Security and Reverse Engineering
Offensive Software Exploitation Course I used to teaching at Champlain College and currently sharing it for free online (check the YouTube channel for the recordings). Most of the slidenotes I used, are already shared on HTID Course, but the labs were fully created by myself. I used publicly available resources and software to explain each of the weakneses covered, so there is nothing here that you cannot find online.
OFFENSIVE SECURITY & REVERSE ENGINEERING (FULL COURSE)
This is the whole course that was covered at Champlain College during Spring 20/21, yes during the COVID-19 pandemic! Unfortunately I was not able to cover all the modules due to time limitation, but other than that I had a great semester with my students and enjoyed teaching this course to them. Big thank you to each one of them, who all graduated now. The course could be found here OSRE. The videos on my YouTube channel walk through most of them.
The vulnerable software I used are also online and can be found at Exploit-db. I also used Stephen Bradshaw's VulnServer, plus maybe some other simple code that I prepared. Please check each lab for the software used in that specific lab and from where to download it.
All of the tools used are free and could be downloaded from the URLs below.
- Immunity Debugger: download
- Kali Linux: download
- CFF Explorer: download
- PE-bear: download
- Ghidra: download
- IDA Free/Demo: download
- x64dbg: download
- Microsoft SysInternals Suite: download
- CAPA by FireEye FLARE Team: download
- NetCat: download
- Download a Windows 10 VM from Microsoft VMs (currently using Version 1809 Build 17763.1339) here. This will be used for most of the labs, except for the EggHunter lab, I used a Windows 7 VM, also from Microsoft VMs (currently offline so check archive.org).
- All the targeted software is Intel/AMD 32-bit unless otherwise instructed.
Table of Contents:
The topics that will be covered in this course are:
- The Basics (PE Format, DLLs, etc)
- Bug Hunting and Fuzzing
- Intro. to Memory Corruption and Buffer Overflows
- Mitigation Techniques
- SEH and Jumping Strategies
- Retrurn Oriented Programming (ROP)
- Post Exploitation
- Manual Code Injection
- Intro. to Assembly x86 and x64 (please check update #3 for this part)
- Reverse Engineering (please check update #3 for this part)
- The number one resource is the Corelan Team's blog, Corelan Team
- Architecture 1001: x86-64 Assembly, OpenSecurityTraining2
On Aug. 6th, 2020 both eLearnSecurity and INE decided to sponsor the English version of the course and therefore will be recording an English version too.
-  Nov. 10th, 2020: will sponsor it myself, since I left working for eLearnSecurity.
-  Nov. 30th, 2020: this course will be taught next semester (Spring 2021) at Champlain College, with a slight difference, the Reverse Engineering section.
-  Jul. 1st, 2021: publishing the whole course that was covered at Champlain College during Spring 20/21, yes during the COVID-19 pandemic!
Thanks to everyone who shared their work online, without them this course would not have happened!