SANS SEC660.4 Exploiting Linux for Penetration Testers

فهرست مطالب کتاب SANS SEC660.4 Exploiting Linux for Penetration Testers:

Introduction to Memory

x86 Assembly Language

Linkers and Loaders

Introduction to Shellcode

Smashing the Stack

Lab: Basic Stack Overflow – Linux

Lab:ret2libc

Return-Oriented Programming (ROP)

Advanced Stack Smashing

Demo:Defeating Stack Protection

LinuxAddress Space Layout Randomization (ASLR)

SANS SEC660.5 Exploiting Windows for Penetration Testers

فهرست مطالب کتاب SANS SEC660.5 Exploiting Windows for Penetration Testers:

Introduction toWindows Exploitation

Windows OS Protections and Compile-Time Controls

Windows Overflows

Lab: Basic Stack Overflow -Windows

Lab: SEH Overwrite

Defeating Hardware DEP with ROP

Demonstration:Defeating Hardware DEP Prior toWindows 7

Lab:Using ROP to Disable DEP

Bootcamp

Lab: ROP Challenge

SANS SEC661.1 ARM Exploit Fundamentals

فهرست مطالب کتاب SANS SEC661.1 ARM Exploit Fundamentals:

ARM Overview

Working with ARM

LAB:Working with ARM

ARM Assembly

Emulating ARM

Debugging ARM

LAB: Debugging ARM Assembly

The Stack

LAB: Branching

Stack Overflows

LAB: Stack Overflows

(Bonus) LAB: TLV

Exploit Mitigations

Shellcode

LAB: Shellcode

LAB: Bad Characters

(Bonus) Intro to Ghidra

SANS SEC661.2 Exploiting IoT Devices

فهرست مطالب کتاب SANS SEC661.2 Exploiting IoT Devices:

Firmware

LAB: Firmware Extraction

Router Emulation

Netgear Exploit

LAB: Netgear Exploit

ROP

LAB: ROP

Dlink Exploit

LAB: Dlink Exploit

Memory Leaks

LAB: Memory Leaks

64-Bit ARM

LAB: 64-Bit ARM

SANS SEC670.1 Windows Tool Development

فهرست مطالب SANS SEC670.1 Windows Tool Development:

Course Overview

Developing Offensive Tools

Developing Defensive Tools

Lab 1.1: PE-sieve

Lab 1.2: ProcMon

Setting Up Your Development Environment

Windows DLLs

Lab 1.3: HelloDLL

Windows Data Types

Call Me Maybe

Lab 1.4: Call Me Maybe

SAL Annotations

SANS SEC670.2 Getting to Know Your Target

فهرست مطالب SANS SEC670.2 Getting to Know Your Target:

Gathering Operating System Information

Lab 2.1: OS Info

Service Packs/Hotfixes/Patches

Process Enumeration

Lab 2.2: ProcEnum

Lab 2.3 CreateToolhelp

Lab 2.4 WTSEnum

Installed Software

Directory Walks

Lab 2.5: FileFinder

User Information

Services and Tasks

Network Information

Registry Information

Bootcamp

SANS SEC670.3 Operational Actions

فهرست مطالب SANS SEC670.3 Operational Actions:

PE Format

Lab 3.1: GetFunctionAddress

Threads

Injections

Lab 3.2: ClassicDLLInjection

Lab 3.3: APCInjection

Lab 3.4: ThreadHijacker

Escalations

Lab 3.5: TokenThief

Bootcamp

Lab 3.6: So, You Think You Can Type

Lab 3.7: UACBypass-Research

Lab 3.8: ShadowCraft

SANS SEC670.4 Persistence Die Another Day

فهرست مطالب کتاب SANS SEC670.4 Persistence: Die Another Day:

In Memory Execution

Dropping to Disk

Binary Patching

Registry Keys

Services Revisited

Lab 4.1: Persistent Service

Port Monitors

Lab 4.2: Sauron

IFEO

Lab 4.3: IFEOPersisto

WMI Event Subscriptions

Bootcamp

SANS SEC670.5 Enhancing Your Implant Shellcode, Evasion, and C2

فهرست مطالب کتاب SANS SEC670.5 Enhancing Your Implant Shellcode, Evasion, and C2:

Custom Loaders

Lab 5.1: The Loader

Unhooking Hooks

Lab 5.2: UnhookTheHook

Bypassing AV/EDR

Calling Home

Lab 5.3: No Caller ID

Writing Shellcode in C

Bootcamp

Lab 5.4: AMSI No More

Lab 5.5: ShadowCraft

SANS SEC699 Workbook Sections 1-3

فهرست مطالب کتاب SANS SEC699 Workbook Sections 1-3:

Day 1: Introduction to Purple-Teaming Tools

Day 2: Advanced Initial Execution

Day 3: Advanced Active Directory and Kerberos Attacks