25.13.16
This website uses cookies to ensure you get the best experience on our website. Learn more

OffSec Exploitation Expert (OSEE)

Rayan Hatim A Althobaiti

OSEEs can analyze vulnerable software, find the problematic code, and develop a functioning exploit under various modern Windows operating systems. They have demonstrated an ability to do the following: * NX/ASLR bypass using different techniques to bypass data execution * Prevent and address space layout randomization protection mechanisms on modern operating systems * Function pointer overwrites – overwriting a function pointer in order to get code execution * Precision heap spraying – spraying the heap for reliable code execution * Disarming EMET mitigations to gain reliable code execution * 64 and 32 Bit Windows Kernel Driver Exploitation * Kernel Pool Exploitation An OSEE can face a system with unknown vulnerable software, reverse engineer it to locate the problematic code, and think creatively in order to develop a functioning exploit under various Windows operating systems.

Skills / Knowledge

  • WinDBG
  • Debugging
  • Exploit Development
  • Shellcode
  • DEP ByPass
  • Sandbox Escape
  • Memory Protection Bypass
  • Heap Spray
  • Windows Kernel Exploitation
  • 64-Bit Exploitation
  • ROP Chain

Issued on

January 29, 2024

Expires on

Does not expire

Earning Criteria

Required