0% found this document useful (0 votes)
511 views12 pages

OSCE Study Guide by Joas

Uploaded by

Sekou Semega
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
511 views12 pages

OSCE Study Guide by Joas

Uploaded by

Sekou Semega
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd

OSWE

OSCE³ Study Guide by Joas OSEP


OSED
My Social Network
Content

Study Materials

Reviews
Labs

Content

Study Materials

Reviews
Reviews

Labs

Content

Study Materials
Reviews

Labs

[Link]
[Link]
[Link]
Web security tools and methodologies
Source code analysis
Persistent cross-site scripting
Session hijacking
.NET deserialization
Remote code execution
Blind SQL injections
Data exfiltration
Bypassing file upload restrictions and file extension filters
PHP type juggling with loose comparisons
PostgreSQL Extension and User Defined Functions
Bypassing REGEX restrictions
Magic hashes
Bypassing character restrictions
UDF reverse shells
PostgreSQL large objects
DOM-based cross site scripting (black box)
Server side template injection
Weak random token generation
XML External Entity Injection
RCE via database Functions
OS Command Injection via WebSockets (BlackBox)
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
Operating System and Programming Theory
Client Side Code Execution With Office
Client Side Code Execution With Jscript
Process Injection and Migration
Introduction to Antivirus Evasion
Advanced Antivirus Evasion
Application Whitelisting
Bypassing Network Filters
Linux Post-Exploitation
Kiosk Breakouts
Windows Credentials
Windows Lateral Movement
Linux Lateral Movement
Microsoft SQL Attacks
Active Directory Exploitation
Combining the Pieces
Trying Harder: The Labs
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
WinDbg tutorial
Stack buffer overflows
Exploiting SEH overflows
Intro to IDA Pro
Overcoming space restrictions: Egghunters
Shellcode from scratch
Reverse-engineering bugs
Stack overflows and DEP/ASLR bypass
Format string specifier attacks
Custom ROP chains and ROP payload decoders
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]
[Link]

You might also like