Process Mitigation Policies & ACG

Attempting to use binary signature policies and arbitrary code guard to bypass userland hooks.

Parent Process ID Spoofing

Supplying arbitrary PPID values to CreateProcess.

File Upload Vulnerabilities

Exploiting file upload vulnerabilities to execute arbitrary code.

SQL Injection

SQL Injection for MySQL databases.

XML External Entity Injection (XXE)

Exploiting XML parsers.

Web Content Discovery

Identifying web content to launch further attacks.

Cross Site Scripting (XSS)

Injecting malicious code into web applications.

Shellcode Obfuscation

Encoding Shellcode for use within malware.

Hack The Box Certified Bug Bounty Hunter (HTB CBBH)

A review of the CBBH course and exam.

Import Address Tables

Hiding IAT entries to evade detection.

802.11 Wireless Attacks

Ways of gaining access to WPA-PSK networks.

Cobalt Strike

Getting started with Cobalt Strike.