Advanced Windows Exploitation (AWE)
Advanced Windows Exploitation (AWE)
Maslak/İstanbul
+90 212 282 7700 - [email protected]
Overview
Modern exploits for Windows-based platforms require modern bypass methods to circumvent Microsoft’s defenses. In Advanced Windows Exploitation
(EXP-401), OffSec challenges students to develop creative solutions that work in today’s increasingly difficult exploitation environment.
The case studies in AWE are large, well-known applications that are widely deployed in enterprise networks. The course dives deep into topics ranging
from security mitigation bypass techniques to complex heap manipulations and 64-bit kernel exploitation.
AWE is a particularly demanding penetration testing course. It requires a significant amount of student-instructor interaction. Therefore, we limit AWE
courses to a live, hands-on environment.
This is the hardest course OffSec offer and it requires a significant time investment. Students need to commit to reading case studies and reviewing the
provided reading material each evening.
Prerequisites
Students should be experienced in developing windows exploits and understand how to operate a debugger. Familiarity with WinDBG, x86_64
assembly, IDA Pro and basic C/C++ programming is highly recommended. A willingness to work and put in real effort will greatly help students
succeed in this security training course.
Outline
1 Introduction
2 Custom Shellcode Creation
2.1 64-bit Architecture
2.1.1 64-bit Memory Enhancements
2.1.2 Calling Conventions
2.1.3 Win32 APIs
2.2 Writing Exploit Code
2.2.1 Position-Independent-Code
2.2.2 Visual Studio
2.3 Shellcode Framework Creation
2.3.1 Finding KERNEL32.DLL Base Address: PEB Method
2.3.2 Resolving Symbols: Export Directory Table Method
2.3.3 Fetching Function’s VMA
2.4 Reverse Shell
2.4.1 Create a Connection
2.4.2 Launch the Shell
2.5 Wrapping Up
3 VMware Workstation Guest-To-Host Escape
3.1 Vulnerability Classes