SANS SEC660.4 Exploiting Linux for Penetration Testers
فهرست مطالب کتاب SANS SEC660.4 Exploiting Linux for Penetration Testers:
Introduction to Memory
x86 Assembly Language
Linkers and Loaders
Introduction to Shellcode
Smashing the Stack
Lab: Basic Stack Overflow – Linux
Lab:ret2libc
Return-Oriented Programming (ROP)
Advanced Stack Smashing
Demo:Defeating Stack Protection
LinuxAddress Space Layout Randomization (ASLR)
SANS SEC660.5 Exploiting Windows for Penetration Testers
فهرست مطالب کتاب SANS SEC660.5 Exploiting Windows for Penetration Testers:
Introduction toWindows Exploitation
Windows OS Protections and Compile-Time Controls
Windows Overflows
Lab: Basic Stack Overflow -Windows
Lab: SEH Overwrite
Defeating Hardware DEP with ROP
Demonstration:Defeating Hardware DEP Prior toWindows 7
Lab:Using ROP to Disable DEP
Bootcamp
Lab: ROP Challenge
SANS SEC661.1 ARM Exploit Fundamentals
فهرست مطالب کتاب SANS SEC661.1 ARM Exploit Fundamentals:
ARM Overview
Working with ARM
LAB:Working with ARM
ARM Assembly
Emulating ARM
Debugging ARM
LAB: Debugging ARM Assembly
The Stack
LAB: Branching
Stack Overflows
LAB: Stack Overflows
(Bonus) LAB: TLV
Exploit Mitigations
Shellcode
LAB: Shellcode
LAB: Bad Characters
(Bonus) Intro to Ghidra
SANS SEC661.2 Exploiting IoT Devices
فهرست مطالب کتاب SANS SEC661.2 Exploiting IoT Devices:
Firmware
LAB: Firmware Extraction
Router Emulation
Netgear Exploit
LAB: Netgear Exploit
ROP
LAB: ROP
Dlink Exploit
LAB: Dlink Exploit
Memory Leaks
LAB: Memory Leaks
64-Bit ARM
LAB: 64-Bit ARM
SANS SEC670.1 Windows Tool Development
فهرست مطالب SANS SEC670.1 Windows Tool Development:
Course Overview
Developing Offensive Tools
Developing Defensive Tools
Lab 1.1: PE-sieve
Lab 1.2: ProcMon
Setting Up Your Development Environment
Windows DLLs
Lab 1.3: HelloDLL
Windows Data Types
Call Me Maybe
Lab 1.4: Call Me Maybe
SAL Annotations
SANS SEC670.2 Getting to Know Your Target
فهرست مطالب SANS SEC670.2 Getting to Know Your Target:
Gathering Operating System Information
Lab 2.1: OS Info
Service Packs/Hotfixes/Patches
Process Enumeration
Lab 2.2: ProcEnum
Lab 2.3 CreateToolhelp
Lab 2.4 WTSEnum
Installed Software
Directory Walks
Lab 2.5: FileFinder
User Information
Services and Tasks
Network Information
Registry Information
Bootcamp
SANS SEC670.3 Operational Actions
فهرست مطالب SANS SEC670.3 Operational Actions:
PE Format
Lab 3.1: GetFunctionAddress
Threads
Injections
Lab 3.2: ClassicDLLInjection
Lab 3.3: APCInjection
Lab 3.4: ThreadHijacker
Escalations
Lab 3.5: TokenThief
Bootcamp
Lab 3.6: So, You Think You Can Type
Lab 3.7: UACBypass-Research
Lab 3.8: ShadowCraft
SANS SEC670.4 Persistence Die Another Day
فهرست مطالب کتاب SANS SEC670.4 Persistence: Die Another Day:
In Memory Execution
Dropping to Disk
Binary Patching
Registry Keys
Services Revisited
Lab 4.1: Persistent Service
Port Monitors
Lab 4.2: Sauron
IFEO
Lab 4.3: IFEOPersisto
WMI Event Subscriptions
Bootcamp
SANS SEC670.5 Enhancing Your Implant Shellcode, Evasion, and C2
فهرست مطالب کتاب SANS SEC670.5 Enhancing Your Implant Shellcode, Evasion, and C2:
Custom Loaders
Lab 5.1: The Loader
Unhooking Hooks
Lab 5.2: UnhookTheHook
Bypassing AV/EDR
Calling Home
Lab 5.3: No Caller ID
Writing Shellcode in C
Bootcamp
Lab 5.4: AMSI No More
Lab 5.5: ShadowCraft
SANS SEC699 Workbook Sections 1-3
فهرست مطالب کتاب SANS SEC699 Workbook Sections 1-3:
Day 1: Introduction to Purple-Teaming Tools
Day 2: Advanced Initial Execution
Day 3: Advanced Active Directory and Kerberos Attacks