We install an intentionally vulnerable Linux system that allows us to work our way through common exploits and misconfigurations.
- Introductions to Security Research – Windows
- Introduction to Security Research – Vulnerable Win 10 Setup
- Introductions to Security Research – Windows – Permissions
- Introductions to Security Research – Win – Privilege Escalation Tools
- Introductions to Security Research – Win – Service Exploits
- Introductions to Security Research – Win – Kernel Exploits
- Introductions to Security Research – Win – Additional Attacks
- Introductions to Security Research – Win – PowerShell and User Privs
- Introductions to Security Research – Win – Privilege Escalation Strategies
- Introduction to Security Research – Linux
- Overview of .EXE and .DLL Files in the .NET world
- ELF Binaries Overview