12/16/2023 0 Comments Hopper disassembler kali linuxProjects Still Undergoing Revision Windows Server 2012 Buffer Overflow Defenses and EMETĬultural Enrichment How to view someones IP address and connection speed with TRACER T! - YouTube Proj 22x: Student Presentation (Usually 15 pts.) Proj 19x: Source Code Analysis with cppcheck (10 pts.) Proj 17x: Security Shepherd Challenges (Up to 40 pts.) Proj 13x: 64-Bit Remote Buffer Overflow with ASLR (25 pts.) Proj 12x: 64-bit Assembler Challenges (25 pts.) Proj 9x: Understanding PE Files and ASLR on Windows (15 pts.) Proj 8x: Remote Shell via Heap Exploit (20 pts.) Proj 7x: Introduction to Hopper (20 pts.) Proj 6x: Remote Shell via Format String Exploit (20 pts.) Proj 5x: Linux Buffer Overflow With Canary (25 pts.) Proj 4x: Linux Buffer Overflow With Shellcode Challenges (30 pts.) Proj 3x: Embedded Security CTF (Up to 25 pts.) Proj 2x: Linux Buffer Overflow Without Shellcode Challenges (25 pts.) Proj 16: Fuzzing with the Failure Observation Engine (20 pts.)Įxtra Credit Projects Proj 1x: Assembly Code Challenges (30 points) Proj 15: SEH-Based Stack Overflow Exploit (25 pts.) Proj 13: 64-Bit Buffer Overflow Exploit (15 pts.) Proj 12: Intro to 64-bit Assembler (15 pts.) Proj 11: Defeating DEP with ROP (20 pts.) Proj 10: Exploiting Easy RM to MP3 Converter on Windows with ASLR (20 pts.) Proj 9: Exploiting "Vulnerable Server" on Windows (25 pts.) Proj 8: Heap Overflow via Data Overwrite (10 pts.) Proj 7: Very Simple Heap Overflow (10 pts.) Proj 6: Exploiting a Format String Vulnerability (20 pts.) Proj 5: Using nasm, ld, and objdump (10 pts.) Proj 4: Remote Linux Buffer Overflow With Listening Shell (20 pts.) Proj 3: Linux Buffer Overflow With Shellcode (20 pts.) Proj 2: Linux Buffer Overflow Without Shellcode (20 pts.) Proj 1 (must renumber later): Linux Buffer Overflow With Command Injection Splash screen, use this version of Jasmin:ĭownload politically correct Jasmin without the cheescake Note: I now recommend using Kali 2.0 for the projects. If you don't want the drawing of a partially undressed woman on the Proj 1: Using Jasmin to run x86 Assembly Code (15 pts.) Lecture 7: Intro to 64-Bit Assembler (pptx) Windows Ch 6: The Wild World of Windows (pptx) Introduction to Exploitation: Linux on x86Ĭh 4: Introduction to format string bugs (pptx)Ĭh 5: Introduction to heap overflows (pptx) Last Class: TBA (Class will meet: the strike was cancelled) Preview of new course "Securing Web Applications" and two more servers to hack "The Shellcoder's Handbook: Discovering and Exploiting Security Holes ", by Chris Anley, John Heasman, Felix Lindner, Gerardo Richarte ASIN: B004P5O38Q Find stack overflow vulnerabilities and exploit themģ. Read and write basic assembly code routinesĢ. Student Learning Outcomes (measured to guide course improvements)ġ. Find vulnerabilities in Cisco IOS and exploit them.Find vulnerabilities in Mac OS X and exploit them.Evade filters and other Windows defenses.Explain various Windows overflows and exploit them.Understand Windows shells and how to write them. Explain essential Windows features and their weaknesses, including DCOM and DCE-RPC.Understand heap overflows and exploit them.Understand format string vulnerabilities and exploit them.Understand Linux shellcode and be able to write your own.Create local privilege escalation exploits.Find stack overflow vulnerabilities and exploit them.Read and write basic assembly code routines.Upon successful completion of this course, the student will be This class covers how to write tools, not just how to use them essential skills for advanced penetration testers and software security professionals.Īdvisory: CS 110A or equivalent familiarity with programming Learn how to find vulnerabilities and exploit them to gain control of target systems, including Linux, Windows, Mac, and Cisco. CNIT 127: Exploit Development - Sam Bowne CNIT 127: Exploit Development
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |