Open Advanced Windows Exploitation
  • Introduction
    • Welcome
      • Subscribe
      • Contents
      • Intended Audience
      • Required Software and Tools
      • Thank You and Support
  • Custom Shellcode
    • 64-bit Architecture
      • 64-bit Enhancements
      • Calling Conventions
    • Shellcode Workflow
      • Visual Studio Code
      • Netwide Assembler
      • Windbg Preview
      • Workflow
    • Writing Shellcode
      • NULL-Free Position-Independent Shellcode
      • Finding kernel32.dll
      • Resolving Symbols
      • Finding VMAs
      • MessageBox Shellcode
      • Avoiding NULL
      • GetLastError
    • Reverse Shell
      • Exercise
      • Solution
  • Exploit Mitigations
    • Understanding the Battlefield
      • Memory Corruption
      • Vulnerability Primitives
      • Overview of Mitigations
    • Our Old Foes
      • DEP
      • ASLR
  • Memory Management
    • Memory Basics
      • Pages
      • Shared Memory
    • Memory Management
      • The Stack
      • The Heap
        • Heap Grooming and Overflow
        • Virtual Functions in C++
        • The Heap Continued
        • Kernel Mode Heap
      • Managed Memory
  • The Kernel
    • Kernel Basics
      • Kernel Structures
      • Kernel Debugging Options
      • Navigating the Kernel
      • Analysing the Kernel
    • Access Tokens
      • Access Token Basics
      • Token Theft
  • Drivers
    • Driver Basics
      • Implementing a Driver
      • Reversing Our Driver
      • A Basic User Mode Application
  • First Kernel Exploit
    • A Kernel Exploit
      • CVE 2020-17382
      • IDA Free
      • Writing A Basic Fuzzer
      • Controlling RIP
      • Meet SMEP
      • ROP to the Rescue
      • kASLR
      • Priv Esc Shellcode
    • Exploit Code
  • References
    • References
Powered by GitBook
On this page
  1. Introduction
  2. Welcome

Intended Audience

Mastering advanced exploitation techniques in Windows is no simple task, but with dedication and effort, it is an attainable skill that can be learned by anybody who is truly dedicated.

This course is open to anybody that wants to learn advanced Windows exploitation techniques. However, if you are new to binary exploitation or penetration testing in general it is unlikely that you will be able to grasp all of the topics without significant preparation.

It is recommended that you understand the concepts presented in the Offensive Security EXP-301: Windows User Mode Exploit Development course or similar.

It is essential you have the capability to create custom shellcode and be familiar with invoking Win32 APIs. A solid comprehension of user mode stack-based buffer overflows is necessary, along with the ability to construct Return Oriented Programming (ROP) chains for circumventing Data Execution Prevention (DEP) mechanisms.

It is expected you can write code to call Windows APIs, in a high-level language such as C, C# or Python.

PreviousContentsNextRequired Software and Tools

Last updated 1 year ago