White Hat Offensive Security Techniques

During my master studies at the University of Applied Sciences | Technikum Wien I chose to focus on White Hat Security. So I spent 3 semesters penetration testing with Kali Linux and many different IT security tools. I documented every single step and you can access the documentation below (more than 250 pages). The courses covered the following topics:

  1. Semester
    • Bash Scripting
    • Information Gathering
    • Port Scanning and ARP Spoofing
    • Buffer Overflows
    • Exploits
    • Remote File Upload
  2. Semester
    • Vulnerability Scan
    • Metasploit
    • Postexploitation & Priviledge Escalation
    • DLL Hijacking & Injection
    • Backdooring Applications
    • AV Evasion
  3. Semester
    • DLL Forward
    • Fuzzing & Structured Exception Handling (SEH) BOF
    • Port forwarding / tunneling
    • Egghunter
    • Return Oriented Programming (ROP)
    • Kerberos
    • Memory Dumping

White Hat Hacking Documentation 1

White Hat Hacking Documentation 2

White Hat Hacking Documentation 3