mirror of
https://github.com/ashemery/exploitation-course
synced 2024-06-28 09:53:44 +00:00
Update README.md
This commit is contained in:
parent
bd26af18dc
commit
713e9eec2d
29
README.md
29
README.md
@ -1,29 +1,28 @@
|
||||
# exploitation-course
|
||||
Offensive Software Exploitation Course
|
||||
|
||||
This repository is for the Offensive Software Exploitation Course I am teaching at Champlain College.
|
||||
|
||||
Most of the slidenotes I used, are already shared on Opensecuritytraining.info, but the labs were fully created by me. I used publically available resources and software to explain each of the weakneses covered, so there is nothing here that you cannot find online.
|
||||
|
||||
Vulnerable Software:
|
||||
**Vulnerable Software:**
|
||||
The vulnerable software I used are also online and can be found at exploit-db.com.
|
||||
|
||||
Tools used:
|
||||
**Tools used:**
|
||||
1. Immunity Debugger
|
||||
2. Kali Linux
|
||||
|
||||
Targets used:
|
||||
**Targets used:**
|
||||
1. Download any Windows 10 VM from Microsoft VMs. This was used for most of the labs, except for the EggHunter lab, I used a Windows 7 VM, also from Microsoft.
|
||||
|
||||
|
||||
Course modules:
|
||||
Module 01 - The Basics (PE Format, DLLs, etc)
|
||||
Module 02 - Bug Hunting and Fuzzing
|
||||
Module 03 - Intro. to Memory Corruption and Buffer Overflows
|
||||
Module 04 - Metasploit
|
||||
Module 05 - Mitigation Techniques
|
||||
Module 06 - SEH and Jumping Strategies
|
||||
Module 07 - Egghunter
|
||||
Module 08 - Retrurn Oriented Programming (ROP)
|
||||
Module 09 - Post Exploitation
|
||||
Module 10 - Manual Code Injection
|
||||
**Course modules:**
|
||||
- Module 01 - The Basics (PE Format, DLLs, etc)
|
||||
- Module 02 - Bug Hunting and Fuzzing
|
||||
- Module 03 - Intro. to Memory Corruption and Buffer Overflows
|
||||
- Module 04 - Metasploit
|
||||
- Module 05 - Mitigation Techniques
|
||||
- Module 06 - SEH and Jumping Strategies
|
||||
- Module 07 - Egghunter
|
||||
- Module 08 - Retrurn Oriented Programming (ROP)
|
||||
- Module 09 - Post Exploitation
|
||||
- Module 10 - Manual Code Injection
|
||||
|
Loading…
Reference in New Issue
Block a user