- March 12, 2025Louis Sohier
Louis Sohier
OSEEs can analyze vulnerable software, find the problematic code, and develop a functioning exploit under various modern Windows operating systems. They have demonstrated an ability to do the following:
* NX/ASLR bypass using different techniques to bypass data execution
* Prevent and address space layout randomization protection mechanisms on modern operating systems
* Function pointer overwrites – overwriting a function pointer in order to get code execution
* Precision heap spraying – spraying the heap for reliable code execution
* Disarming EMET mitigations to gain reliable code execution
* 64 and 32 Bit Windows Kernel Driver Exploitation
* Kernel Pool Exploitation
An OSEE can face a system with unknown vulnerable software, reverse engineer it to locate the problematic code, and think creatively in order to develop a functioning exploit under various Windows operating systems.
Skills / Knowledge
- WinDBG
- Debugging
- Exploit Development
- Shellcode
- DEP ByPass
- Sandbox Escape
- Memory Protection Bypass
- Heap Spray
- Windows Kernel Exploitation
- 64-Bit Exploitation
- ROP Chain
Issued on
March 12, 2025
Expires on
Does not expire