mirror of
https://github.com/ashemery/exploitation-course
synced 2024-06-28 09:53:44 +00:00
Update README
This commit is contained in:
parent
21383b1e48
commit
b067d9614f
14
README.md
14
README.md
@ -2,11 +2,11 @@
|
||||
|
||||
This repository is for the Offensive Software Exploitation Course I am teaching at Champlain College and currently doing it for free online (check the YouTube channel for the recordings). Most of the slidenotes I used, are already shared on [HTID Course](http://opensecuritytraining.info/HTID.html), but the labs were fully created by myself. I used publically available resources and software to explain each of the weakneses covered, so there is nothing here that you cannot find online.
|
||||
|
||||
|
||||
---
|
||||
### Vulnerable Software
|
||||
The vulnerable software I used are also online and can be found at [Exploit-db](https://www.exploit-db.com/). I also used Stephen Bradshaw's [VulnServer](https://github.com/stephenbradshaw/vulnserver), plus maybe some other simple code that I prepared. Please check each lab for the software used in that specific lab and from where to download it.
|
||||
|
||||
|
||||
---
|
||||
### Tool(s) Required
|
||||
All of the tools used are free and could be downloaded from the URLs below.
|
||||
1. Immunity Debugger: [download](https://www.immunityinc.com/products/debugger/)
|
||||
@ -15,11 +15,11 @@ All of the tools used are free and could be downloaded from the URLs below.
|
||||
4. NetCat: [download](https://joncraton.org/blog/46/netcat-for-windows/)
|
||||
5. Others!
|
||||
|
||||
|
||||
---
|
||||
### Target(s) Used
|
||||
Download a Windows 10 VM from Microsoft VMs (currently using Version 1809 Build 17763.1339) [here](https://developer.microsoft.com/en-us/microsoft-edge/tools/vms/). This will be used for most of the labs, except for the EggHunter lab, I used a Windows 7 VM, also from Microsoft VMs (currently offline so check archive.org).
|
||||
|
||||
|
||||
---
|
||||
### Table of Contents:
|
||||
The topics that will be covered in this course are:
|
||||
- 01 - The Basics (PE Format, DLLs, etc)
|
||||
@ -33,16 +33,16 @@ The topics that will be covered in this course are:
|
||||
- 09 - Post Exploitation
|
||||
- 10 - Manual Code Injection
|
||||
|
||||
|
||||
---
|
||||
### Video Recordings:
|
||||
- Arabic version: [Playlist](https://www.youtube.com/playlist?list=PLCS2zI95IiNyo5AhbVIL2hVX7zhuSkOkz)
|
||||
- English version (coming soon): [Playlist](https://www.youtube.com/channel/UCnGqqX9vefQV0d68ktNblrQ)
|
||||
|
||||
|
||||
---
|
||||
### Useful Resources:
|
||||
1. The number one resource is the Corelan Team's blog, [Corelan Team](https://www.corelan.be/)
|
||||
|
||||
|
||||
---
|
||||
### Update(s):
|
||||
1. On Aug. 6th, 2020 both [eLearnSecurity](https://www.elearnsecurity.com/) and [INE](https://www.ine.com/) decided to sponsor the English version of the course and therefore will be recording an English version too.
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user