title: “Offensive Security Exploitation Expert Exam Report”
author: [“student@youremailaddress.com“, “OSID: XXXX”]
date: “2020-07-25”
subject: “Markdown”
keywords: [Markdown, Example]
subtitle: “OSEE Exam Report”
lang: “en”
titlepage: true
titlepage-color: “FFD700”
titlepage-text-color: “000000”
titlepage-rule-color: “000000”
titlepage-rule-height: 2
book: true
classoption: oneside
code-block-font-size: \scriptsize
Intro
The Offensive Security OSEE exam documentation contains all efforts that were conducted in order to pass the Offensive Security Exploitation Expert exam. This report will be graded from a standpoint of correctness and fullness to all aspects of the exam. The purpose of this report is to ensure that the student has the technical knowledge required to pass the qualifications for the Offensive Security Exploitation Expert certification.
The student will be required to fill out this exam documentation fully and to include the following sections:
- Methodology walkthrough and detailed outline of steps taken
- Each finding with included screenshots, walkthrough, sample code, and proof.txt if applicable.
- Any additional items that were not included
192.168.66.63
Proof.txt
Provide the contents of proof.txt
ROP Chains with Explanations
Provide the ASM ROP chains used in the exploit with a brief explanation for each gadget.
PoC Code
Provide the final proof of concept code used to gain access to the server.
Screenshots
Provide a screenshot of the ipconfig command and the contents of proof.txt.
Steps
Provide a detailed account of your methodology in creating the exploit. The steps taken should be able to be easily followed and reproducible if necessary.
192.168.66.6
Proof.txt
Provide the contents of proof.txt
ASM Shellcode with Explanation
Provide the ASM shellcode instructions used in the exploit with a brief explanation for each instruction.
PoC Code
Provide the final proof of concept code used to elevate privileges on the target.
Screenshots
Provide a screenshot of the id command and the contents of proof.txt.
Steps
Provide a detailed account of your methodology in creating the exploit and elevating your privileges. The steps taken should be able to be easily followed and reproducible if necessary.
Additional Items Not Mentioned in the Report
This section is placed for any additional items that were not mentioned in the overall report.