Fruits of Learning
search
⌘Ctrlk
Fruits of Learning
  • Overview
  • Tools & Cheatsheets
  • Hacking Methodology
  • Hands-on Practice
  • Changelog
  • Courses
    • πŸ“¦Hack The Box
    • πŸ•΄οΈOffSec
      • 🦊EXP-301
      • πŸ™EXP-312
      • βš“IR-200
      • πŸ‰PEN-103
      • 🐲PEN-200
      • πŸ›œPEN-210
      • πŸ”—PEN-300
        • Module 1: Evasion Techniques and Breaching Defenses: General Course Information
        • Module 2: Operating System and Programming Theory
        • Module 3: Client Side Code Execution With Office
        • Module 4: Phishing with Microsoft Office
        • Module 5: Client Side Code Execution With Windows Script Host
        • Module 6: Reflective PowerShell
        • Module 7: Process Injection and Migration
        • Module 8: Introduction to Antivirus Evasion
        • Module 9: Advanced Antivirus Evasion
        • Module 10: Application Whitelisting
        • Module 11: Bypassing Network Filters
        • Module 12: Linux Post-Exploitation
        • Module 13: Kiosk Breakouts
        • Module 14: Windows Credentials
        • Module 15: Windows Lateral Movement
        • Module 16: Linux Lateral Movement
        • Module 17: Microsoft SQL Attacks
        • Module 18: Active Directory Exploitation
        • Module 19: Attacking Active Directory
        • Module 20: Combining the Pieces
        • Module 21: Trying Harder: The Labs
      • βš›οΈSEC-100
      • πŸ›‘οΈSOC-200
      • 🐝TH-200
      • πŸ¦‰WEB-200
      • πŸ•·οΈWEB-300
    • πŸ’ΈSANS
    • πŸ›‘οΈSecurity Blue Team
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
githubEdit
  1. Courseschevron-right
  2. πŸ•΄οΈOffSecchevron-right
  3. πŸ”—PEN-300

Module 2: Operating System and Programming Theory

PreviousModule 1: Evasion Techniques and Breaching Defenses: General Course Informationchevron-leftNextModule 3: Client Side Code Execution With Officechevron-right