Attempting to use binary signature policies and arbitrary code guard to bypass userland hooks.
Supplying arbitrary PPID values to CreateProcess.
Exploiting file upload vulnerabilities to execute arbitrary code.
SQL Injection for MySQL databases.
Exploiting XML parsers.
Identifying web content to launch further attacks.
Injecting malicious code into web applications.
Encoding Shellcode for use within malware.
A review of the CBBH course and exam.
Hiding IAT entries to evade detection.
Ways of gaining access to WPA-PSK networks.
Getting started with Cobalt Strike.