Exploit Developer Student – XDS Course Review
I first want to thank eLearnSecurity for creating such a course on this topic of exploit development. I have always been a big fan of the Windows operating system. For the past few years, I have spent a lot of time on Windows reverse engineering, Windows internals and exploit development on Windows. However, the thing I liked the most about this course is about the diversity they have with both Windows and Linux both x86 and x86_64. I spent quite a good amount of time on learning Linux exploit development and internals and I totally loved to understand those concepts no matter how hard they were to grasp. It is a feeling I cannot explain ?
I will share my thoughts on each section.
Linux Exploit Development
Module 1: Linux Stack Smashing
As usual, this is the introductory module where you will get a nice understanding of Linux internals and basics of stack-based buffer overflows and identifying them.
The labs included for this module are:
- Hidden Function
- Linux Basic Stack Overflow
- Linux x64 Basic Stack Overflow
Module 2: Linux Exploit Countermeasures & Bypasses
This section was an intense module on bypassing Linux exploitation mitigation techniques. The following were covered in-depth with examples. I believe this was the largest module in this section. I’ve learned a lot of internals, theory and new things in this module in the world of *nix.
- NX
- ASLR
- Stack Cookies
- RELRO
- PIE
- RPATH
Module 3: Linux Return Oriented Programming
This module explains the concepts of Return Oriented Programming (ROP) and how to utilize this technique to bypass anti-exploit mechanisms. I would recommend to first study Module 2 related to anti-exploit mechanisms and then move on to this module and do the labs. As you need theory from both of these modules for the labs.
The labs included for these 2 modules are:
- Linux NX Bypass (ret2libc)
- Overcome ret2libc Limitations
- Linux x64 ASLR Bypass
- Linux x64 Stack Canary, NX & ASLR Bypass
- Linux x64 NX Bypass (ret2libc + ROP)
Module 4: Linux Shellcoding
This module explains about developing Linux shellcode and concepts such as Egghunters to detect the shellcode in memory when there’s lack of space in the stack. A full walkthrough of 32-bit reverse TCP shellcode is explained with socket internals. Furthermore, developing 64-bit shellcode on Linux is explained.
The lab included for this module is:
- Linux Shellcoding
Module 5: Linux Advanced Exploitation
To come to this module, make sure you study all the previous module well. This module explains in-depth about exploiting format string vulnerabilities and how it could be abused to bypassing anti-exploit mechanisms. Also covers bypassing hardened systems. This module has some intense labs and it was very challenging to understand the exploitation process. I loved this module a lot as these types of vulnerabilities can be abused to bypass modern anti-exploit mechanisms and are still being reported in the real world in commercial applications.
- Linux NX & ASLR Bypass (Format String Exploitation + ROP)
- Strict Firewall Bypass (Format String Exploitation + Socket Reuse Shellcode)
Windows Exploit Development
Module 1: Windows Stack Smashing
This module explains the basics of exploiting stack-based buffer overflows in Windows systems. You will learn different tools to automated certain tasks and internals.
The labs included for this module are:
- Windows Basic Stack Overflow
Module 2: Windows SEH-based Overflows
This module explains about abusing software which utilized the Structured Exception Handling mechanism under Windows systems. The labs will provide you more understanding practically how it works under a debugger.
The labs included for this module are:
- Windows SEH Overflow (MP3 Studio)
- Windows SEH Overflow (EasyChat)
Module 4: Unicode Buffer Overflows
This module explains the process of creating venetian shellcode and utilizing it in Unicode Buffer Overflow exploits. This technique is useful if the application changes user input in case of translation.
Module 5: Windows Shellcoding
This module explains the art of shellcoding in Windows. It also goes in-depth on developing position independent shellcode on Windows. This module also includes a socket reuse shellcode and about backdooring PE files
The labs included for this module are:
- Windows Shellcoding
Module 6: Windows Return Oriented Programming
This module explains the Return Oriented Programming (ROP) theory on Windows. This module was also intense as it dives deep into manual ROP chaining. I really loved this module as I learned a lot about developing my own manual ROP chains.
The labs included for this module are:
- Windows ROP (Scenario 1)
- Windows ROP (Scenario 2)
Fuzzing Windows Software
This was another lab exercise on explaining the usage of the SPIKE fuzzer.
The Exam
The exam was challenging. It was of 3 days and another 2 days were provided for the report. Since there were 3 days I did not have that much stress. There were 5 challenges in total for both Windows and Linux environments x86 and x86_64. There are no multiple-choice questions and it’s a full practical exam. You are supposed to develop a proof-of-concept for each challenge and document down your process, tools used, etc. Everything is well taught in the course and if you study the materials and do the labs your passing chances are high.
The following knowledge domains will be assessed in the exam.
- Windows and Linux internals
- Reverse engineering (x86 and x64 platforms)
- Software debugging
- Shellcoding
- Windows and Linux exploit development (including scripting knowledge)
- Bypassing modern anti-exploit mechanisms (ASLR/PIE, Stack Cookie, NX/DEP, RELRO etc.)
- Exploiting hardened hosts and overcoming limitations
A huge thanks to ?ukasz Miku?a for creating this course and for assessing my exam report. Special thanks to Dimitrios Bougioukas from eLearnSecurity 🙂
More information about the XDS Course: https://www.elearnsecurity.com/course/exploit_development_student/
Thanks for sharing and congratulations, can you share what format did you use for reporting in the exam(a template if you used any)
You are welcome! You will get a template when you take the exam.
hi any recommendation what is tools that need to prepared before exam? such a mona, fuzzer etc?
Awesome review!!, here is another review if you would like to take a look https://sandeepbaldawa.medium.com/xds-v1-elearnsecurity-course-review-cda5bb12f95b
Nice one!