Skip to content

SkyBulk/the-day-of-nightmares

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

17 Commits
 
 
 
 
 
 

Repository files navigation

From noob to 0day developer

Introduction

the reason why I'm writting this kind of how-to become you into a exploit writer is because I was in the same boat as you , So I had to research link by link to find the right ones. I call this kind of how-to course from noob to hero covering the basics of penetration testing to the hottest topic such as Sandbox Escape.

The inspiration:

What has been kept me so interested and motivated into 0day research , and everything I googled led me to google security research team known as Google Project Zero. Don't judme maybe I cannot reach at that level yet, but the day I gave up on my dreams, I will be dead inside.

Recommendations:

  • Aim for the impossible
  • This is not a basic course even if I call it "noob"
  • Be prepared to suffer as much as possible
  • Nightmares
  • Don't be afraid of assembly
  • Network with other cybersecurity folks
  • Get familiar with WinDBG,Immunity , and IDA
  • Don't be as those people who tell you "Try harder" (which in some cases means: I am not going to help you)

bootcamp

Information Gathering & Vulnerability Scanning

Buffer Overflows

Privilege Escalation

Finding Public Exploits

Creating Metasploit Payloads

Web Application Attacks

Password Attacks

Port Redirection and Tunneling

Bypassing Antivirus Software

At this point you will be able to perfom Penetration testing / Red Team stuff as an entry level

I didn't mention The Metasploit Framework, because I want you learn the TECHNIQUES

camp

Backdooring PE files

Bypassing Antivirus Systems , the second stage

Advanced Exploitation Techniques

corelan

fuzzysecurity

fuzzing

Debuggers

Disassemblers

Dissemblers, disassembly frameworks etc.,

IDA Pro - The best disassembler

At this point you will be confortable with intermediate exploit development from a somple BOF to bypass software protections such as DEP

do an intensive reverse engineering course before jumping the third & last stage. you will not know the light without it

power

Heap Spraying

Heap Overflows

JIT-spray

Browser

Enhanced Mitigation Experience Toolkit (EMET)

Mitigation Bypass

Twitter

Releases

No releases published

Packages

No packages published