Expert Penetration Testing: Writing Windows Exploits

Master the latest advanced level methodologies, tools, and manual techniques used by ethical hackers to enter the top 10% of security professionals in terms of skill.

or call us on (866)-471-0059

Expert Penetration Testing Course Overview

The InfoSec Institute Expert Hacking course provides an in-depth and hands-on review of the most current exploit development strategies and techniques for the Microsoft Windows platform.

This course is designed to provide a hands-on, interactive learning experience. To the end, the course includes approximately 30 minutes of lab work after each hour of lecture and Q&A time. Lab sessions are generally run four times per day.

The lab sessions are a crucial learning component of the class, and are strongly recommended. The labs ask students to reverse engineer sample programs as well as real production software to discover vulnerabilities. In addition to static analysis methods, various runtime vulnerability discovery methods such as fuzzing and runtime analysis in a debugger will be used.

Later exercises demonstrate more advanced concepts and tools – such as exploiting SafeSEH, the new ASLR protections found in Vista and Windows 7, and many others.

HOW YOU’LL BENEFIT:

Prerequisites:

View Pricing

We will never share any of your information, spam you or annoy you with pushy sales pitches.

Get Instant Pricing

What You'll LEARN

Module 1: Primer on Windows Internals

  • A primer on windows internals• Windows architecture
  • Windows internals from the ground up
  • Windows sockets
  • Threads and Processes
  • File handling 
  • File formats
  • Process injection and remote thread injection
  • Understanding exploit development across different windows versions

Module 2: Stack Overflows

  • Understanding modularity of code and how it can lead to a stack overflow situation
  • Typing stack overflows
  • Functions and Prologs
  • Controlling EIP through RET
  • Returning to shellcode on the stack
  • Shellcode strategies
  • Generating shellcode
  • Exploiting real world vulnerabilities

Module 3: Understanding Windows Shellcode

  • Understanding shellcode concepts
  • Important X86 assembler concepts for shellcode
  • System Calls
  • Finding Kernel32.dll
  • Using hash searching instead of string searching
  • PEB vs. SEH Methods
  • Resolving Symbol Addresses with find_function
  • Using LoadLibraryA to load additional libraries
  • Creating processes with CreateProcessA
  • Exiting processes with ExitProcessA
  • Writing Connect Back shellcode
  • Portbind shellcode

Module 4: Dynamic Vulnerability Analysis

  • Dynamic concepts
  • Pros and Cons vs. static analysis
  • Instrumented analysis with a debugger
  • Using INT3 with shellcode injection
  • Fuzzing basics
  • Good fuzzers vs. bad fuzzers
  • Content and protocol awareness
  • Block-based fuzzing
  • File format fuzzing
  • Fuzzing with a debugger
  • Crashes or exploitable bugs?
  • Back tracing
  • Using Pei mei and bin navi

Module 5: Heap Overflows

  • Heap management on XP SP1 and earlie
  • Heap management on XP SP2 and newer
  • Understanding the heap memory manager
  • Chunks and logically contiguous memory
  • Flink, Blink pointers
  • Manipulating heap headers
  • Fake chunk creation
  • Unlinking and the 4 byte memory overwrite
  • Overwriting a SEH handler

Module 6: Advanced Windows Shellcode

  • HTTP download and execute shellcode
  • Using the InternetAPI functions
  • InternetOpen, InternetOpenURL, InternetReadFile
  • Staged Loading Shellcode
  • Dynamic file Descriptor Reuse
  • First stage loaders for size limitations
  • Searching processes for injected shellcode
  • Egghunt shellcode
  • Using the syscall version of Egghunt
  • IAT connectback

Module 7: Exploiting /GS stack canary protected programs

  • Understanding /GS in Visual Studio
  • Stack Cookies
  • Variable Reordering
  • strict_gs_check
  • /GS and its relation to SEH
  • /GS and string buffers
  • Bypassing the stack cookie
  • Reading stack cookie values
  • Defeating /GS application heuristics
  • Understanding the exception dispatcher
  • Using the exception handler to overwrite RET
  • Difficulties with SafeSEH implementations

Module 8: Exploiting SafeSEH protected programs

  • Exception handler validation
  • Exception chain validation under Server 2008
  • Executing anywhere but the stack
  • Placing SEH handlers on the heap
  • DEP enabled SafeSEH issues
  • Exploiting linked modules without SafeSEH
  • ATL.DLL example

Module 9: Defeating safe unlinking and safe lookaside lists

  • Understanding the Safe Unlink changes
  • Heap metadata cookies
  • Heap header encryption under Vista
  • Understanding the lookaside list
  • Exploiting the lookaside list in XP
  • Process termination heap vulnerabilties

Module 10: Understanding Data Execution Prevention (DEP)

  • Windows paging theory
  • Introduction to DEP
  • DEP Model
  • Hardware support with NX
  • Software DEP
  • DEP Polices in boot.ini
  • Setting policies at runtime

Module 11: Exploiting Data Execution Prevention (DEP)

  • Attacking DEP-incompatible applications
  • Exploiting RWX mappings
  • Leveraging the JVM for RWX exploitation
  • Code reuse 
  • Returning to a page mapping/protection routine
  • System command/process creation routines
  • Security policy violations

Module 12: Understanding Address Space Layout Randomization (ASLR)

  • Address randomization theory
  • Image randomization
  • Rebasing requirements for executable modules
  • Executable randomization
  • The Vista randomization bug
  • DLL randomization
  • RTLHeapCreate randomization
  • Stack randomization

Module 13: Exploiting Address Space Layout Randomization (ASLR)

  • Exploiting statically positioned DLLs and executables
  • Instantiating ActiveX controls
  • Growing heap size with user controlled data
  • Heap spraying
  • Calculating heap spraying effectiveness
  • Partial overwrites 
  • Memory information leaks

Interested in training?

You can register your interest and we’ll keep you up to date when public courses become available. You can also register your interest in on-site training.

Thanks! We’ll keep you updated
As soon as we have news of the status of this course, we’ll be in touch.
  • or call us on (866)-471-0059

We’ve trained over 50,000 happy people

Expert Penetration Testing: Writing Windows Exploits is part of these career tracks

New Exam Pass Guarantee!

Our new Live Online format has produced excellent results. We trust the course quality will help you pass on your first exam attempt and this exam-pass guarantee backs up that trust.