Update README

This commit is contained in:
binary 2020-08-06 19:27:00 -04:00
parent 21383b1e48
commit b067d9614f

@ -2,11 +2,11 @@
This repository is for the Offensive Software Exploitation Course I am teaching at Champlain College and currently doing it for free online (check the YouTube channel for the recordings). Most of the slidenotes I used, are already shared on [HTID Course](http://opensecuritytraining.info/HTID.html), but the labs were fully created by myself. I used publically available resources and software to explain each of the weakneses covered, so there is nothing here that you cannot find online. This repository is for the Offensive Software Exploitation Course I am teaching at Champlain College and currently doing it for free online (check the YouTube channel for the recordings). Most of the slidenotes I used, are already shared on [HTID Course](http://opensecuritytraining.info/HTID.html), but the labs were fully created by myself. I used publically available resources and software to explain each of the weakneses covered, so there is nothing here that you cannot find online.
---
### Vulnerable Software ### Vulnerable Software
The vulnerable software I used are also online and can be found at [Exploit-db](https://www.exploit-db.com/). I also used Stephen Bradshaw's [VulnServer](https://github.com/stephenbradshaw/vulnserver), plus maybe some other simple code that I prepared. Please check each lab for the software used in that specific lab and from where to download it. The vulnerable software I used are also online and can be found at [Exploit-db](https://www.exploit-db.com/). I also used Stephen Bradshaw's [VulnServer](https://github.com/stephenbradshaw/vulnserver), plus maybe some other simple code that I prepared. Please check each lab for the software used in that specific lab and from where to download it.
---
### Tool(s) Required ### Tool(s) Required
All of the tools used are free and could be downloaded from the URLs below. All of the tools used are free and could be downloaded from the URLs below.
1. Immunity Debugger: [download](https://www.immunityinc.com/products/debugger/) 1. Immunity Debugger: [download](https://www.immunityinc.com/products/debugger/)
@ -15,11 +15,11 @@ All of the tools used are free and could be downloaded from the URLs below.
4. NetCat: [download](https://joncraton.org/blog/46/netcat-for-windows/) 4. NetCat: [download](https://joncraton.org/blog/46/netcat-for-windows/)
5. Others! 5. Others!
---
### Target(s) Used ### Target(s) Used
Download a Windows 10 VM from Microsoft VMs (currently using Version 1809 Build 17763.1339) [here](https://developer.microsoft.com/en-us/microsoft-edge/tools/vms/). This will be used for most of the labs, except for the EggHunter lab, I used a Windows 7 VM, also from Microsoft VMs (currently offline so check archive.org). Download a Windows 10 VM from Microsoft VMs (currently using Version 1809 Build 17763.1339) [here](https://developer.microsoft.com/en-us/microsoft-edge/tools/vms/). This will be used for most of the labs, except for the EggHunter lab, I used a Windows 7 VM, also from Microsoft VMs (currently offline so check archive.org).
---
### Table of Contents: ### Table of Contents:
The topics that will be covered in this course are: The topics that will be covered in this course are:
- 01 - The Basics (PE Format, DLLs, etc) - 01 - The Basics (PE Format, DLLs, etc)
@ -33,16 +33,16 @@ The topics that will be covered in this course are:
- 09 - Post Exploitation - 09 - Post Exploitation
- 10 - Manual Code Injection - 10 - Manual Code Injection
---
### Video Recordings: ### Video Recordings:
- Arabic version: [Playlist](https://www.youtube.com/playlist?list=PLCS2zI95IiNyo5AhbVIL2hVX7zhuSkOkz) - Arabic version: [Playlist](https://www.youtube.com/playlist?list=PLCS2zI95IiNyo5AhbVIL2hVX7zhuSkOkz)
- English version (coming soon): [Playlist](https://www.youtube.com/channel/UCnGqqX9vefQV0d68ktNblrQ) - English version (coming soon): [Playlist](https://www.youtube.com/channel/UCnGqqX9vefQV0d68ktNblrQ)
---
### Useful Resources: ### Useful Resources:
1. The number one resource is the Corelan Team's blog, [Corelan Team](https://www.corelan.be/) 1. The number one resource is the Corelan Team's blog, [Corelan Team](https://www.corelan.be/)
---
### Update(s): ### Update(s):
1. On Aug. 6th, 2020 both [eLearnSecurity](https://www.elearnsecurity.com/) and [INE](https://www.ine.com/) decided to sponsor the English version of the course and therefore will be recording an English version too. 1. On Aug. 6th, 2020 both [eLearnSecurity](https://www.elearnsecurity.com/) and [INE](https://www.ine.com/) decided to sponsor the English version of the course and therefore will be recording an English version too.