Title | Content |
---|---|
Title | offensive security advanced windows exploitation |
Type | E-Book |
Language | English |
Author | matteo memelli |
Description |
Writing exploits on modern Windows based platforms over the years has become a complex dance of memory manipulation to circumvention of modern mitigations Microsoft has put in place. Offensive Security's Advanced Windows Exploitation Techniques (AWE) challenges you to develop creative solutions that work in today's increasingly difficult exploitation environment. Covering techniques ranging from precision heap spraying, to DEP and ASLR bypass, real-world 64-bit kernel exploitation, and EMET bypasses, in a hands-on lab focused environment. AWE makes a point of introducing a concept and then allowing you to work through a case study applying what you learned, with multiple instructors on hand for help with any problems. The case studies covered include vulnerabilities discovered by our research team or exploits written by Offensive Security. Topics covered include: NX/ASLR Bypass - Using different techniques to bypass Data Execution Prevention and Address Space Layout Randomization protection mechanisms on modern operating systems. Function pointer overwrites - Overwriting a function pointer in order to get code execution. Precision Heap Spraying - Spraying the heap for reliable code execution. Disarming EMET Mitigations to gain reliable code execution 64 and 32 Bit Windows Kernel Driver Exploitation - Exploring 32 and 64 bit kernel exploitation. Kernel Pool Exploitation |
Views: | 1600 |
Publish time |
6 years ago
2018-07-28 08:30:00
|
Download |
|
AcTioN |
|
Please login/register to Leave a Reply