OSCE Preparation
This repo contains a resources that should be followed step by step during the OSCE preperation.
Please do NOT hesitate to create an issue in order to add resource to the list.
Getting Familiar with Assembly Language
BOOK : Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation https://www.amazon.com/Practical-Reverse-Engineering-Reversing-Obfuscation/dp/1118787315
Videos : x86 Assembly Language and Shellcoding on Linux https://www.pentesteracademy.com/course?id=3
Another Video : Reverse Engineering Win32 Applications Course Videos https://www.pentesteracademy.com/course?id=41
Corelan.be Exploit Development Articles
One of the greatest resource about getting started with buffer overflows.
-
Corelan.be BOF - 0x01 | Exploit writing tutorial part 1 : Stack Based Overflows
-
Corelan.be BOF - 0x02 | Exploit writing tutorial part 2 : Stack Based Overflows – jumping to shellcode
-
Corelan.be BOF - 0x03 | Exploit writing tutorial part 3 : SEH Based Exploits
-
Corelan.be BOF - 0x04 | Exploit writing tutorial part 3b : SEH Based Exploits – just another example
-
Corelan.be BOF - 0x05 | Exploit writing tutorial part 4 : From Exploit to Metasploit – The basics
-
Corelan.be BOF - 0x06 | Exploit writing tutorial part 5 : How debugger modules & plugins can speed up basic exploit development
-
Corelan.be BOF - 0x07 | Exploit writing tutorial part 6 : Bypassing Stack Cookies, SafeSeh, SEHOP, HW DEP and ASLR
-
Corelan.be BOF - 0x08 | Exploit writing tutorial part 7 : Unicode – from 0x00410041 to calc
FuzzySecurity Windows Exploit Development Tutorial Series
Another awesome resource about exploit development.
- Part 1: Introduction to Exploit Development
- Part 2: Saved Return Pointer Overflows
- Part 3: Structured Exception Handler (SEH)
- Part 4: Egg Hunters
- Part 5: Unicode 0x00410041
- Part 6: Writing W32 shellcode
- Part 7: Return Oriented Programming
- Part 8: Spraying the Heap [Chapter 1: Vanilla EIP]
- Part 9: Spraying the Heap [Chapter 2: Use-After-Free]
- Part 10: Kernel Exploitation -> Stack Overflow
- Part 11: Kernel Exploitation -> Write-What-Where
- Part 12: Kernel Exploitation -> Null Pointer Dereference
- Part 13: Kernel Exploitation -> Uninitialized Stack Variable
- Part 14: Kernel Exploitation -> Integer Overflow
- Part 15: Kernel Exploitation -> UAF
- Part 16: Kernel Exploitation -> Pool Overflow
- Part 17: Kernel Exploitation -> GDI Bitmap Abuse (Win7-10 32/64bit)
- Part 18: Kernel Exploitation -> RS2 Bitmap Necromancy
- Part 19: Kernel Exploitation -> Logic bugs in Razer rzpnk.sys
Fuzzing
TODO later
AV Bypass
TODO later https://captmeelo.com/exploitdev/osceprep/2018/07/16/backdoor101-part1.html https://captmeelo.com/exploitdev/osceprep/2018/07/21/backdoor101-part2.html