Course curriculum

  • 1

    Chapter 0

    • Introduction

  • 2

    Chapter 1

    • Information Gathering

  • 3

    Chapter 2

    • FortiSIEM - install and setup the environment

  • 4

    Chapter 3

    • Entrypoint identification

  • 5

    Chapter 4

    • First exploitation attempt

  • 6

    Chapter 5

    • Import Richsploit on Eclipse

  • 7

    Chapter 6

    • Exploit re-engineering and cleanup

    • Step by step exploitation - part 1

    • Step by step exploitation - part 2

    • Step by step exploitation - part 3

    • Final payload tuning