Offensive Software Exploitation Course
This repository is for the Offensive Software Exploitation Course I am teaching at Champlain College and currently doing it for free online (check the YouTube channel for the recordings). Most of the slidenotes I used, are already shared on HTID Course, but the labs were fully created by myself. I used publically available resources and software to explain each of the weakneses covered, so there is nothing here that you cannot find online.
The vulnerable software I used are also online and can be found at Exploit-db. I also used Stephen Bradshaw's VulnServer, plus maybe some other simple code that I prepared. Please check each lab for the software used in that specific lab and from where to download it.
All of the tools used are free and could be downloaded from the URLs below. - Immunity Debugger: download - Kali Linux: download - CFF Explorer: download - PE-bear: download - Ghidra: download - IDA Pro: download - x64dbg: download - Microsoft SysInternals Suite: download - CAPA by FireEye FLARE Team: download - NetCat: download - Others!
The topics that will be covered in this course are: 1. The Basics (PE Format, DLLs, etc) 2. Bug Hunting and Fuzzing 3. Intro. to Memory Corruption and Buffer Overflows 4. Metasploit 5. Mitigation Techniques 6. SEH and Jumping Strategies 7. Egghunter 8. Retrurn Oriented Programming (ROP) 9. Post Exploitation 10. Manual Code Injection 11. Intro. to Assembly x86 and x64 (please check update #3 for this part) 12. Reverse Engineering (please check update #3 for this part)
Thanks to everyone who shared their work online, without them this course would not have happened!