Skip to content

Commit

Permalink
CCE & README update
Browse files Browse the repository at this point in the history
  • Loading branch information
wetw0rk committed Jan 6, 2021
1 parent a49022c commit a6cb731
Showing 1 changed file with 36 additions and 2 deletions.
38 changes: 36 additions & 2 deletions README.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
# AWAE PREP Layout

This repository will serve as the "master" repo containing all trainings and tutorials done in preperation for OSWE in conjunction with the AWAE course. This repo will likely contain custom code by me and varous courses. Below you can see in what order I completed these challenges / courses.
This repository will serve as the "master" repo containing all trainings and tutorials done in preparation for OSWE in conjunction with the AWAE course. This repo will likely contain custom code by me and various courses. Below you can see in what order I completed these challenges / courses.

## Prep Breakdown

Expand All @@ -16,7 +16,7 @@ The following table shows notes, courses, challenges, and tutorials taken in pre
| 6 | Understanding PHP Object Injection | Tutorial | https://securitycafe.ro/2015/01/05/understanding-php-object-injection/ |
| 7 | /dev/random: Pipe | Challenge | https://www.vulnhub.com/entry/devrandom-pipe,124/ |
| 8 | Understanding Java Deserialization | Tutorial | https://nytrosecurity.com/2018/05/30/understanding-java-deserialization/
| 9 | Practicing Java Deserialization Exploits | Challenge/Tutorial | https://diablohorn.com/2017/09/09/understanding-practicing-java-deserialization-exploits/ |
| 9 | Practicing Java Deserialization Exploits | Challenge/Tutorial | https://diablohorn.com/2017/09/09/understanding-practicing-java-deserialization-exploits/ |
| 10 | SQL Injection Attacks and Defense | Book | https://www.amazon.com/Injection-Attacks-Defense-Justin-Clarke/dp/1597499633 |

## Post Prep Breakdown
Expand All @@ -30,3 +30,37 @@ Having completed the course, below is everything done in regards to prep before
- Look for vulnerabilities ;)

This may not seem like much, but it's what I did for prep. My best advice is DO NOT OVERTHINK things and don't rush through it. It took me 2 attempts when it should have taken one, I was jumping around not documenting enough what I was trying (It's easy to create your own rabbit holes...). Slow down you have 48 hours!

## Community Contributions & Enhancements

If you find a new tutorial, challenge, or improve one of the exploits/payloads feel free to submit a pull request! Since Offsec has recently updated the course I may take it at a later date and upload some new challenges myself.

The main things I ask when contributing any challenges or tutorials is:

1. All challenges/tutorials MUST be hands on - no exceptions. If its something where you just look at code snippets try to make it interactive. Re-code the samples and simulate them etc.
2. You yourself must have the challenge completed. This means working through it and having code samples ready to submit.
3. ALL submissions must follow the same structure as the main repository. Meaning:
- Its own directory
- A README.md containing:
- A header describing the submission (e.g XSS and MySQL - NO SQLMAP ALLOWED) along with a description of the challenge.
- A personal note to either help the challenger or point them in the right direction.
- Links, always credit the original authors!
- Code Samples, Working Exploit Code, Working Payloads! I don't wanna hear about the theory of a universal bypass I wanna see it in code!
- NO WEBM submissions. I don't trust some of you haha, YouTube links are fine though.

For your own safety I recommend adding a header like this to all your code:

```python
#/usr/bin/env python
#
# Exploit Title : Practicing Java Deserialization Exploits
# Author : wetw0rk
# Vulnerable Software : https://github.com/NickstaDB/DeserLab
#
# Usage : DeserLab is an intentionally vulnerable server that
# is vulnerable to java deserialization. This exploit
# leverages the vulnerability within the application.
#
```

Just to be sure you get as much credit as you deserve.

0 comments on commit a6cb731

Please sign in to comment.