pwncollege
DojosLeaderboardCommunity
Back to cse598-se-s2025

Injection and Hijacking

cse598-se-s2025
0/9 challenges completed

While Windows has many concepts familiar to those seen in Windows, the win32 API and windows security model is quite different and allows for scenarios uncommon in Linux. This module will explore some classic Windows injection and hijacking techniques that allow code to be executed in the context of another process, such as DLL injection, process hollowing, and thread hijacking. As an added twist, a rudimentary Endpoint Detection and Response (EDR) system will be used to detect and block these techniques. Can you bypass the EDR and execute your code in the context of another process?

Note: This dojo is slowly being developed, including iterating on infrastructure support. Functionality is subject to change!

Class Livestream - Windows Security Model - 2025.03.26
Video
Slides
Class Livestream - Injection and Hooking - 2025.04.02
Video
Slides
Class Livestream - More Windows - 2025.04.16
Video
The Robdefender EDR

Challenges

1
The Humble Calculator
2
Hello World
3
Alloc For What?
4
Alloc For What? 2
5
How to open a File
6
How to open a File 2
7
How to open a File 3
8
How to open a File 4
9
How to open a File 5