MODULE 1: Foundations
Lesson 1.1 - Offensive Tooling Landscape & Career Paths
- Part 1 - The Offensive Tooling Landscape
- Part 2 - Commercial vs Open-Source Frameworks
- Part 3 - Evolution of Post-Exploitation Frameworks
- Part 4 - Legal and Ethical Considerations
- Part 5 - Career Paths in Offensive Security
- Part 6 - Industry Trends and Emerging Techniques
- Part 7 - Practical Exercises
- Part 8 - Conclusion + Next Steps
Lesson 1.2 - Using Go For Offensive Development
- Part 1 - Why Use Go for Modern Offensive Tooling
- Part 2 - Go’s Limitations - The Honest Assessment
- Part 3 - Language Comparison - Go vs the Competition
- Part 4 - Go Runtime Internals Relevant to Evasion
- Part 5 - Practical Exercises
- Part 6 - Knowledge Validation
- Part 7 - Conclusion + Next Steps
Lesson 1.3 - Windows Internals Review For Offensive Operations
- Part 1 - Process Architecture
- Part 2 - Thread Architecture
- Part 3 - Virtual Memory Management
- Part 4A - Windows Security Model: Access Tokens, Checks, Privileges
- Part 4B - Windows Security Model: SeDebugPrivilege Lab
- Part 4C - Windows Security Model: Integrity Levels and UAC
- Part 4D - Windows Security Model: Process Protection Framework
- Part 5A - The PE File Format: Intro + Understanding Address Translation
- Part 5B - The PE File Format: The 7 Layers
- Part 5C - The PE File Format: Simple PE Parser Lab
- Part 5D - The PE File Format: Process Memory Mapping Lab
- Part 6 - PEB and TEB
- Part 7 - Practical Exercises
- Part 8 - Knowledge Validation
- Part 9 - Conclusion + Next Steps