This repo contains a resources that should be followed step by step during the OSCE preperation.
Please do NOT hesitate to create an issue in order to add resource to the list.
BOOK : Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation https://www.amazon.com/Practical-Reverse-Engineering-Reversing-Obfuscation/dp/1118787315
Videos : x86 Assembly Language and Shellcoding on Linux https://www.pentesteracademy.com/course?id=3
Another Video : Reverse Engineering Win32 Applications Course Videos https://www.pentesteracademy.com/course?id=41
One of the greatest resource about getting started with buffer overflows.
-
Corelan.be BOF - 0x01 | Exploit writing tutorial part 1 : Stack Based Overflows
-
Corelan.be BOF - 0x02 | Exploit writing tutorial part 2 : Stack Based Overflows – jumping to shellcode
-
Corelan.be BOF - 0x03 | Exploit writing tutorial part 3 : SEH Based Exploits
-
Corelan.be BOF - 0x04 | Exploit writing tutorial part 3b : SEH Based Exploits – just another example
-
Corelan.be BOF - 0x05 | Exploit writing tutorial part 4 : From Exploit to Metasploit – The basics
-
Corelan.be BOF - 0x06 | Exploit writing tutorial part 5 : How debugger modules & plugins can speed up basic exploit development
-
Corelan.be BOF - 0x07 | Exploit writing tutorial part 6 : Bypassing Stack Cookies, SafeSeh, SEHOP, HW DEP and ASLR
-
Corelan.be BOF - 0x08 | Exploit writing tutorial part 7 : Unicode – from 0x00410041 to calc
Another awesome resource about exploit development.
- Part 1: Introduction to Exploit Development
- Part 2: Saved Return Pointer Overflows
- Part 3: Structured Exception Handler (SEH)
- Part 4: Egg Hunters
- Part 5: Unicode 0x00410041
- Part 6: Writing W32 shellcode
- Part 7: Return Oriented Programming
- Part 8: Spraying the Heap [Chapter 1: Vanilla EIP]
- Part 9: Spraying the Heap [Chapter 2: Use-After-Free]
- Part 10: Kernel Exploitation -> Stack Overflow
- Part 11: Kernel Exploitation -> Write-What-Where
- Part 12: Kernel Exploitation -> Null Pointer Dereference
- Part 13: Kernel Exploitation -> Uninitialized Stack Variable
- Part 14: Kernel Exploitation -> Integer Overflow
- Part 15: Kernel Exploitation -> UAF
- Part 16: Kernel Exploitation -> Pool Overflow
- Part 17: Kernel Exploitation -> GDI Bitmap Abuse (Win7-10 32/64bit)
- Part 18: Kernel Exploitation -> RS2 Bitmap Necromancy
- Part 19: Kernel Exploitation -> Logic bugs in Razer rzpnk.sys
TODO later
TODO later https://captmeelo.com/exploitdev/osceprep/2018/07/16/backdoor101-part1.html https://captmeelo.com/exploitdev/osceprep/2018/07/21/backdoor101-part2.html