Jump to content
NO-MERCY

Advanced Windows Exploitation

Recommended Posts

Posted

Hello RST ...

O9pfi.jpg

This book about "AWE" Advanced Windows Exploitation V1.1

Offensive Security

#----------------------#

Table of Contents

#----------------------#

Module 0x00 Introduction

_ Module 0x01 Egghunters

_ Lab Objectives

_ Overview

_ Exercise 1-1

MS08-067 Vulnerability

_ MS08-067 Case Study: Crashing the Service

_ MS08-067 Case Study: Finding the Right Offset

_ MS08-067 Case Study: From PoC to Exploit

_ Controlling the Execution Flow

_ Getting our Remote Shell

_ Wrapping Up

Module 0x02 Bypassing NX

_ Lab Objectives

_ A Note from the Authors

- Overview

_ Hardware-Enforcement and the NX Bit

_ Hardware-Enforced DEP Bypassing Theory Part I

_ Hardware-Enforced DEP Bypassing Theory Part II

_ Hardware-Enforced DEP on Windows 2003 Server SP2

_ MS08-067 Case Study: Testing NX Protection

_ Exercise

_ MS08-067 Case Study: Approaching the NX Problem

_ MS08-067 Case Study: Memory Space Scanning

_ MS08-067 Case Study: Defeating NX

_ Exercise

_ MS08-067 Case Study: Returning into our Buffer

_ Exercise

_ Wrapping Up

Module 0x02 (Update) Bypassing DEP AlwaysOn Policy

_ Lab Objectives

_ Overview

_ Ret2Lib Attacks and Their Evolution

_ Return Oriented Programming Exploitation

_ Immunity Debugger’s API and findroppy

_ Exercise

_ ASLR

_ PHP 60 Dev Case Study: The Crash

_ PHP 60 Dev Case Study: The ROP Approach

_ PHP 60 Dev Case Study: Preparing the Battlefield

_ Exercise

_ PHP 60 Dev Case Study: Crafting the ROP Payload

_ Steps 1 and 2

_ Steps 3 and 4

_ Step 5

_ PHP 60 Dev Case Study: Getting our Shell

_ Exercise

_ Deplib: Gadgets on Steroids

_ Classification

_ Searching the Database

_ Stack Pivoting

_ Wrapping Up

Module 0x03 Custom Shellcode Creation

_ Lab Objectives

_ Overview

_ System Calls and “The Windows Problem”

_ Talking to the Kernel

_ Finding kernel32dll: PEB Method

_ Exercise

_ Resolving Symbols: Export Directory Table Method

_ Working with the Export Names Array

_ Computing Function Names Hashes

_ Fetching Function's VMA

_ MessageBox Shellcode

_ Exercise

_ Position Independent Shellcode (PIC)

_ Exercise

_ Shellcode in a Real Exploit

_ Exercise

_ Wrapping Up

Module 0x04 Venetian Shellcode

_ Lab Objectives

_ Overview

_ The Unicode Problem

_ The Venetian Blinds Method

_ Exercise

_ DivX Player 66 Case Study: Crashing the Application

_ Exercise

_ DivX Player 66 Case Study: Controlling the Execution Flow

_ Exercise

_ DivX Player 66 Case Study: The Unicode Payload Builder

_ DivX Player 66 Case Study: Getting our Shell

_ Exercise

Module 0x05 Kernel Drivers Exploitation

_ Lab Objectives

_ Overview

_ Windows I/O System and Device Drivers

_ Communicating with drivers

_ I/O Control Codes

_ Privilege Levels and Ring0 Payloads

_ Staging R3 Payloads from Kernel Space

_ Case Study Payloads

_ Case Study Payload (1): Token Stealing

_ Case Study payload (2): MSR Hooking

_ Function Pointer Overwrites

_ avast! Case Study: Kernel Memory Corruption

_ avast! Case Study: Way Down in ring0 Land

_ Exercise

_ avast! Case Study: Bypassing Device Driver Checks

_ Exercise

_ avast! Case Study: EIP Hunting

_ Exercise

_ avast! Case Study: Elevation (1)

_ Exercise

_ avast! Case Study: Elevation (2)

_ Exercise

_ Wrapping up

Module 0x06 64-bit Kernel Driver Exploitation

_ Lab Objectives

_ Overview

_ 64-bit Address Space

_ 64-bit Main Enhancements

_ Windows-On-Windows Emulation

_ 64-bit Exploitation: General Concepts

_ MS11-080 Case Study: The Bug

_ MS11-080 Case Study: IOCTL Hunting

_ MS11-080 Case Study: Triggering the vulnerable code

_ Exercise

_ MS11-080 Case Study: Mapping your Route

_ MS11-080 Case Study: “BSODing” the Box

_ Exercise

_ MS11-080 Case Study: Owning RIP

_ MS11-080 Case Study: You are on your Own Bring me a SYSTEM Shell!

Module 0x07 Heap Spraying

_ Lab Objectives

_ Overview

_ JavaScript Heap Internals Key Points

_ Heap Spray: The Technique

_ Heap Spray Case Study: CVE-2011-2371 POC

_ Exercise

_ Heap Spray Case Study: A Deeper Look at the Bug

_ Heap Spray Case Study: Mapping the Object in Memory

_ Exercise

_ Heap Spray Case Study: Controlling the Execution Flow

_ Exercise

_ Heap Spray Case Study: Stack Pivoting

_ Exercise

_ Heap Spray Case Study: Pointers Stunts

_ Exercise

_ Heap Spray Case Study: When 1bit = Shell

_ Exercise

_ Wrapping Up

Download link : "AWE" Advanced Windows Exploitation V1.1

size : 33 Mb

parts : 4 pdf's

pages : 185

password : NO-MERCY

Best Regrads

  • Downvote 2

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...