Preparation
New References
- https://tulpa-security.com/2017/07/18/288/
- https://m101.github.io/binholic/2018/04/28/yet-another-osce-review.html
- https://github.com/FabioBaroni/awesome-exploit-development
Summarized References
- https://aminbohio.com/study-guide-tips-offensive-security-certified-expert-osce-cracking-the-perimeter-ctp/
Tools
- Olly Debugger
- WinDBG
- Immunity Debugger with Mona
- CFF Explorer
- LordPE
- DevCPP
- nasm
- VulnServer
Training
Open Security Training
- Introductory Intel x86: Architecture, Assembly, Applications, & Alliteration
- Introduction To Software Exploits
- Exploits 2: Exploitation in the Windows Environment
Exploit development
- Corelan Exploit Writing Tutorial Series
- Exploit Writing Tutorial Part 1 – Stack Based Overflows
- Buffer Overflows in the Microsoft Windows® Environment
- Basic Reverse Engineering with Immunity Debugger
Egg hunting
- "Safely Searching Process Virtual Address Space" By Skape
- Egg Hunters – Fuzzy Security
- Egg Hunters – A Twist In Buffer Overflows
Fuzzing
- 15 Minute Guide To Fuzzing
- SkyDogCon 2015: Fuzzing Basics – Scott M
- An Introduction to Fuzzing: Using fuzzers (SPIKE) to find vulnerabilities
Practice
Bypassing exploit mitigation:
- Bypassing ASLR/DEP
- Exploit writing tutorial part 6 : Bypassing Stack Cookies, SafeSeh, SEHOP, HW DEP and ASLR
- Exploit Dev 101: Bypassing ASLR on Windows
- Bypassing ASLR and DEP on Windows 7: The Audio Converter Case
Shellcoding:
- Exploit Writing Tutorial Part 9 – Introduction To Win32 Shellcoding
- ShellCode By Hand
- http://security.cs.rpi.edu/courses/binexp-spring2015/lectures/7/05_lecture.pdf
- http://sh3llc0d3r.com/windows-reverse-shell-shellcode-i/
Web app security
- Web Application Pentesting – Webpwnized
- File Inclusion Vulnerabilities
- Guide Book on Cross Site Scripting
- Finding vulnerabilities in Web Applications
AV evasion:
- https://resources.infosecinstitute.com/bypassing-antivirus/
- https://www.youtube.com/watch?v=tBY46vs0ptE
- https://dl.packetstormsecurity.net/papers/bypass/bypassing-av.pdf
- https://pentest.blog/art-of-anti-detection-1-introduction-to-av-detection-techniques/
Practice
VulnServer Walk-throughs
CTF
- CTP Registration: http://fc4.me/