Welcome

Welcome to this Open Advanced Windows Exploitation course. This course will challenge you to develop creative solutions to bypass modern exploit mitigations in the Windows Operating System.

"I may not be a pioneer, nor possess the brilliance to uncover intricate zero-days, but through dedicated effort, I can acquire the knowledge and techniques of those more adept than I."

Whoami

My name is John Tear, I have studied Offensive Security topics since 2017 and work in a highly-sensitive industry as a cybersecurity professional. Previously, I worked in Information Technology for over 20 years, and I have always been 'fascinated' with 'hacking'.

I have completed all the requirements and criteria to earn the OSCP, OSCE (discontinued), and OSCE³ certifications.

You can find me on GitHub and LinkedIn. And you can view my Offensive Security credentials on Accredible.

I hope to take the OSEE at least once!

Author's Motivations

I have now reached a stage in my learning journey that requires me to delve into more advanced subjects. This course aims to capture and share my acquired knowledge, enabling others to benefit from my experiences.

When it comes to advanced learning, there are not many readily available commercial courses at an affordable price. As a result, I felt it prudent to conduct my own research and document the learning journey.

Contents

The course will contain techniques to bypass user mode and kernel mode security mitigations, advanced memory manipulations, kernel driver vulnerability discovery and exploitation, and advanced 64-bit shellcode development.

This course is not a substitute for other Advanced Windows Exploitation courses, nor is it a free, open, copy of any other courses. It is a collection of topics that I am learning and sharing with others. Where appropriate, attribution will be made to others.

Note: Course content may change at any point during writing.

Disclaimer

The following free, open course has been created with the intention of providing educational information to the best of the author's knowledge and abilities. However, please note that there may be errors, inaccuracies, or omissions in the content presented. The author has dedicated personal time and effort to develop this course.

It is essential to understand that engaging with this course is entirely voluntary, and any actions or decisions taken based on the information provided are solely at the discretion and responsibility of the participants. The author shall not be held liable for any direct or indirect damages or consequences arising from the use or application of the course materials.

While efforts have been made to ensure the accuracy and validity of the content, it is strongly recommended that participants independently verify the information and seek additional resources or professional guidance as necessary.

Participants are encouraged to provide feedback or report any identified errors, as this can contribute to improving the course. However, the author does not guarantee that all reported errors will be corrected or that feedback will be implemented in subsequent versions of the course.

By accessing and using this course, participants acknowledge and accept the limitations and disclaimers outlined above. They agree to hold the author harmless from any claims, demands, or damages, including but not limited to legal fees, arising out of or connected to the course or its use.

Please proceed with the course only if you fully understand and agree to these terms.

License

CC-BY 4.0 (“Attribution”), you can do what you want with my work, but you must credit me, or others that I have referenced (without breaching their license conditions). Please refer to the Creative Commons license for exact details.

You are free to:

  • Share — copy and redistribute the material in any medium or format

  • Adapt — remix, transform, and build upon the material

  • for any purpose, even commercially.

Under the following terms:

  • Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.

  • No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.

Last updated