Open Advanced Windows Exploitation
  • Introduction
    • Welcome
      • Subscribe
      • Contents
      • Intended Audience
      • Required Software and Tools
      • Thank You and Support
  • Custom Shellcode
    • 64-bit Architecture
      • 64-bit Enhancements
      • Calling Conventions
    • Shellcode Workflow
      • Visual Studio Code
      • Netwide Assembler
      • Windbg Preview
      • Workflow
    • Writing Shellcode
      • NULL-Free Position-Independent Shellcode
      • Finding kernel32.dll
      • Resolving Symbols
      • Finding VMAs
      • MessageBox Shellcode
      • Avoiding NULL
      • GetLastError
    • Reverse Shell
      • Exercise
      • Solution
  • Exploit Mitigations
    • Understanding the Battlefield
      • Memory Corruption
      • Vulnerability Primitives
      • Overview of Mitigations
    • Our Old Foes
      • DEP
      • ASLR
  • Memory Management
    • Memory Basics
      • Pages
      • Shared Memory
    • Memory Management
      • The Stack
      • The Heap
        • Heap Grooming and Overflow
        • Virtual Functions in C++
        • The Heap Continued
        • Kernel Mode Heap
      • Managed Memory
  • The Kernel
    • Kernel Basics
      • Kernel Structures
      • Kernel Debugging Options
      • Navigating the Kernel
      • Analysing the Kernel
    • Access Tokens
      • Access Token Basics
      • Token Theft
  • Drivers
    • Driver Basics
      • Implementing a Driver
      • Reversing Our Driver
      • A Basic User Mode Application
  • First Kernel Exploit
    • A Kernel Exploit
      • CVE 2020-17382
      • IDA Free
      • Writing A Basic Fuzzer
      • Controlling RIP
      • Meet SMEP
      • ROP to the Rescue
      • kASLR
      • Priv Esc Shellcode
    • Exploit Code
  • References
    • References
Powered by GitBook
On this page
  • Open Advanced Windows Exploitation
  • Foundation Topics
  • .Net User Mode Exploitation
  • VMWare Exploitation
  • Browser Exploitation
  • Advanced Kernel Exploitation
  • End of Course Challenge
  1. Introduction
  2. Welcome

Contents

PreviousSubscribeNextIntended Audience

Last updated 1 year ago

Open Advanced Windows Exploitation

Foundation Topics

Welcome to the world of advanced exploitation of the Windows operating system. In this section, we will explore the concepts, techniques, and workflows specifically designed for Windows exploitation.

Whether you are familiar with 32-bit binary exploitation or new to the Windows Kernel and 64-bit architectures, this is the ideal starting point to enhance your skills. Let's embark on a comprehensive exploration of Windows exploitation together.

  • ; Exploring 64-bit x86 Architecture and Crafting Custom Shellcode

  • ; Exploring Windows Memory Management, Stack, and Heap

  • ; Types of Vulnerabilities and Mitigations in Focus.

  • ; A Brief Overview of Windows Kernel, Data Structures, and Debugging Techniques.

  • ; An Introduction to Driver Development and Communication Channels.

  • ; Beginning the exploitation of Windows Drivers, Mitigations, and Bypass Techniques.

.Net User Mode Exploitation

Coming soon

VMWare Exploitation

Coming soon

Browser Exploitation

Coming soon

Advanced Kernel Exploitation

Coming soon

End of Course Challenge

Coming soon

Custom Shellcode
Memory Management
Exploit Mitigations
The Kernel
Drivers
A Kernel Exploit