About Me
I’m a Vulnerability Reseacher for desktop apps. I’ve made quite a few vulnerability research , especially on memory corruption. Now, I am doing more interested on browser security & writting some malware poc for fun.
email: aronimperial20[at]gmail.com
My Vulnerability Research Training
300 Days
Advanced Vulnerability Research Training
- Intro to Browser Exploitatio(windows xp)
- Browser Exploitation
- Intro to heap (browser) exploitation
- Memory leaks
225 Days
Vulnerability Research Training
- C/C++ Skills
- Basic Reversing
- Immunity Debugger
- Wingdb
- IDA Pro
- More Topics About Exploit Development
- Egghunter
150 DaysWinDbg Mona 2 Structure Exception Handling (SEH) Heap Windows Basics Introduction to shellcoding Fuzzing Exploitme1 (ret eip overwrite) Exploitme2 (Stack cookies & SEH) Exploitme3 (DEP) Exploitme4 (ASLR) Metasploit Modules TCP/UDP
Introduction To Exploit Development Training
- Manual
- Msfvenom
- Call / jmp / push esp technique
- Pop pop ret
- Call / jmp [reg + offset]
- Boofuzz
- PeachFuzz
- The Right Module
- Bad Characters
- Non-safeseh Modules
- Bypassing Safeseh
- Rop Chain
- Ret2libc
- Non-Aslr
- 2 Byte Overwrite
75 Days
PWK Course / OSCP Training
- Information Gathering
- Vulnerability Identification and Prioritization
- Password Cracking & rule based
- Research and Development
- Exploitation
- Linux & windows Local Privilege Escalation
- Post-Exploitation
- Expanding Influence
- Client Side Attack Against Internal Network
- Privilege Escalation Through AD Misconfigurations
- Port Tunneling
- SSH Tunneling with HTTP Encapsulation
- Looking for High Value Targets
- Exfiltration techniques
- Domain Privilege Escalation