AWE-Exam-Report
AWE-Exam-Report
OSID: XXXXX
No part of this publication, in whole or in part, may be reproduced, copied, transferred or any other right reserved
to its copyright owner, including photocopying and all other copying, any transfer or transmission using any
network or other means of communication, any broadcast for distant learning, in any form or by any means such as
any information storage, transmission or retrieval system, without prior written permission from Offensive Security.
1 | Page
Table of Contents
2 | Page
1.0 Offensive-Security OSEE Exam Documentation
The Offensive Security OSEE exam documentation contains all efforts that were
conducted in order to pass the Offensive Security Exploitation Expert exam. This re-
port will be graded from a standpoint of correctness and fullness to all aspects of
the exam. The purpose of this report is to ensure that the student has the technical
knowledge required to pass the qualifications for the Offensive Security Exploitation
Expert certification.
The student will be required to fill out this exam documentation fully and to include
the following sections:
3 | Page
2.0 192.168.XX.11 (25 Points or 50 Points)
2.1 Proof.txt
Explain the research performed and steps taken to perform initial exploitation with
the provided CVE.
Explain the research performed and steps taken to create a read and write primitive
including ASLR bypass.
Explain the research performed and steps taken to bypass all the mitigations ex-
cluding the sandbox and obtain code execution. Also include the execution of an ar-
bitrary Win32 API if only partial solution is provided.
Explain the research performed and steps taken to escape the sandbox and obtain
a reverse shell.
4 | Page
2.7 Screenshots
5 | Page
3.0 192.168.XX.63 (25 or 50 Points)
3.1 Proof.txt
Explain the research performed and steps taken to perform initial exploitation with
the provided CVE.
Explain the research performed and steps taken to perform a kernel memory leak
with the provided CVE.
Explain the research performed and steps taken to create a kernel mode read and
write primitive if you are submitting the full solution.
Explain the research performed and steps taken to escalate your privileges to SYS-
TEM if you are submitting the full solution.
3.7 Screenshots
6 | Page
.
7 | Page