Leaderboard
Popular Content
Showing content with the highest reputation on 06/12/13 in all areas
-
Lecture 1: Intro, Ethics, & Overview: This lecture covers the course Intro, syllabus review, distinction between hacking vs. penetration testing, ethics discussion, course motivation, threat models and some of the basics. Lecture 2: Linux Overview: This lecture covers the basics to an OS, Kernel vs user space, system calls, unix permissions, ruid vs euid etc..., ext file system (for the limited focus of forensics), persistence mechanisms used by malware, and /var/log, and more. Lecture 3: Windows Overview This lecture provides an overview of the registry and registry hives, persistence mechanisms used by malware, Portable Executable (PE) file format overview, window systems calls commonly used by malware, and the windows API. Lecture 4: Rootkits; Code Auditing The first half of this lecture covers rootkits and rootkit techniques for windows and linux. The second half covers code auditing concepts like design flaws, software analysis, vulnerability identification, signed bugs (int over/under flows), incorrect use of length params (strncpy, strncat, snprintf), format strings, … Lecture 5: x86 Reverse engineering This lecture is day one of our weeklong x86 reverse engineering workshop lead by guest lecturer Mitch Adair. Lecture 6: This lecture is day two of our weeklong x86 reverse engineering workshop lead by guest lecturer Mitch Adair. Lecture 7: Fuzzing and Exploit Development 101 This lecture covers a fuzzing overview, the basics of exploit development, environment variables, stack attacks, buffer overflow, nop-sleds, etc... Lecture 8: Shellcode and Exploit Development 102 Lectore topics: more on writing Shellcode (linux vs windows), win32 process memory map ... Lecture 9: Exploit Development 103: SEH Exploitation, Heap Sprays, and Executable Security Mechanisms This lecture covers SEH exploitation, heap sprays, and executable security mechanisms like ASLR, DEP/NX, Stack Cookies... Lecture 10: Networking 101: Data Layer, Link Layer, and IP layer This lecture covers an overview of networking concepts and network security concepts. Topics covered: Wireshark, Nmap, nc, Hubs vs switches vs routers, manufacturer default logins / backdoors... ARP & dns (dnssec), proxies, weak IP vs strong IP model (RFC 1122) Lecture 11: Networking 102: TCP layer, Important Protocols, Services, Portscanning, ARP This lecture finishes up the networking overview from last time. Lecture 12: Web application Hacking 101 Its a bit shorter than other videos as the class time was taken up going over homework beforehand. This lecture addresses some of the big picture with the topics covered so far, and moves into web application security topics. Lecture 13: Web Application Hacking 102: Big picture of topics so far, SQLi, XSS This lecture's topices cover HTTP proxies, SQLi and XSS Lecture 14: Web Application Hacking 103: SSL attacks, advanced techniques This lecture's topics cover SSL/TLS, Certificate Authorities, and the serious problems with the Certificate Authority infrastructure, and a history of CA hacks / breaches, and SSL hacking tools like sslstrip ... Lecture 15: Web Application Hacking 104 & Exploit Development 104 This class was two lectures in one. In the web application 104 lecture we cover topics like WAF, and IDS and how to evade them - which leads into the exploit development 104 lecture. In the exploit dev 104 section we cover topics like networking shellcode, polymorphic shellcode / encoders, and the methodology for defeating IDS/WAF Lecture 16: Midterm review & Exploit Development 105 (ROP) This lecture's first half is a review of topics for the midterm. The second half introduces Return Oriented Programming. Lecture 17: The Modern History of Cyber Warfare This lecture covers just a small sample of the major events one might consider part of the history of cyber warfare. The lecture discusses some of the potential tactical and strategic differences between traditional warfare and cyber warfare - as well as the policy and perspective hurdles we face today. This lecture happened shortly after the ground-breaking APT1 report from Mandiant. Lecture 18: Social Engineering The first portion of this video is a continuation of the previous lecture on cyber warfare. Afterwards, this lecture offers a new spin on social engineering - by staring with fundamental psychological flaws in the human brain, and discussing how they can be exploited... Lecture 19: Metasploit This lecture covers the metasploit framework, its interfaces, basic usage, and some of its utilities, along with a brief discussion of the social-engineering toolkit (SET)... Lecture 20: Meterpreter and Post Exploitation This lecture starts by finishing the SET discussion from last time, covers Windows access-tokens, then delves into meterpreter and post exploitation... Lecture 21: Volatility and Incident Response: This lecture covers an overview of Incident Response and delves into Volatility and memory analysis.. Lecture 22: Physical Security Workshop: Lockpicking, USB mischief, and BacNET/SCADA system security This lecture covers physical security, with a hands-on workshop on lockpicking, along with a simultaneous discussion of USB-related-mischief, building hacking (BacNET / SCADA) .... Lectures & Videos: Offensive Security Home Page (CIS 4930 / CIS 5930) Spring 2013 Videos: https://www.youtube.com/user/gtg051x/videos?sort=da&view=0&flow=list Curs oferit de Florida State University1 point
-
;////////////////////////////////////////////////////////////////! ; ; Eq_G2 v.3 by cybervu - RSTForums.com ; ;////////////////////////////////////////////////////////////////| ; ; Formula: ax^2 + bx + c = 0 ; Radacini: x(1,2) = (-b +/- sqrt(b^2 - 4*a*c)) / (2*a) ; ;////////////////////////////////////////////////////////////////| ; ; x86 CPU instruction set ; ; finit Initialize floating point processor ; fld Floating point load ; fld1 Push +1.0 onto the FPU register stack. ; fldz Push +0.0 onto the FPU register stack. ; fdiv Divide ; fdivp Divide and pop ; fadd Add ; fmul Multiply ; fldz Load 0.0 onto stack ; fcom Compare ; fcomp Compare and pop ; fsqrt Square root ; fchs Change sign ; fsubr Reverse subtract ; fsubrp Reverse subtract and pop ; fst Store ; fstp Store and pop ; fstsw Store status word ; sahf Store AH into flags ; ;/////////////////////////////////////////////////////////////////////////////' .686 ; 32 bit code .model flat, stdcall ; 32 bit memory model option casemap :none ; case sensitive include \masm32\include\masm32.inc include \masm32\include\user32.inc include \masm32\include\kernel32.inc include \masm32\include\msvcrt.inc includelib \masm32\lib\masm32.lib includelib \masm32\lib\user32.lib includelib \masm32\lib\kernel32.lib includelib \masm32\lib\msvcrt.lib include \masm32\macros\macros.asm .Data xA Real10 ? xB Real10 ? xC Real10 ? x1 Real10 ? x2 Real10 ? .Code start: Call Main exit ; ------------------------------------------------------------------------- InputR10 Proc ptr10:Ptr Real10 ; citeste o valoare reala (float) // crt_scanf() LOCAL r8:Real8 invoke crt_scanf, SADD("%lf"), ADDR r8 mov eax, ptr10 finit fld r8 fstp Real10 PTR [eax] Ret InputR10 EndP ; ------------------------------------------------------------------------- satan Proto:Real10, :Real10, :Real10 Main Proc print "A=" Invoke InputR10, Addr xA ; input A print "B=" Invoke InputR10, Addr xB ; input B print "C=" Invoke InputR10, Addr xC ; input C Invoke satan, xA, xB, xC ; calcule Ffree st(0) ; goleste stiva Ffree st(1) ; Ffree st(2) ; print chr$(13, 10) print "cybervu - RSTForums.com" call wait_key ; "Press any key to continue..." Ret Main EndP ; ------------------------------------------------------------------------- satan Proc A_:Real10, B_:Real10, C_:Real10 ; b*b si pune in stiva finit ; init fld B_ ; incarca b fld st ; b fmul ; st(0) = b*b = b^2 ; 4*a*c fld1 ; 1 fld1 ; 1 fadd ; st(0) = 1 + 1 = 2 fld st ; 2 fadd ; st(0) = 2 + 2 = 4 fld A_ ; incarca a fld C_ ; incarca c fmul ; fmul ; st(0) = 4*a*c ; st(1) = b^2 fsub ; st(0) = st(1) - st(0) // = delta ; delta (?) 0 : jmp fldz ; incarca 0 fcomp st(1) ; compara st(1)=0 cu st(0) = ((b^2)-(4*a*c)) // = delta fstsw ax ; salveaza sahf ; jbe delta_ok ; delta >= 0 jmp delta_negativ ; -> "nu are radacini reale" delta_ok: fsqrt ; extrage radical fld st ; copie fld B_ ; incarca b fchs ; schimba semnul // -b fadd st(1),st ; st(1) = [-b] + [sqrt(delta)] fsubrp st(2),st ; st(0) = [-b] + [sqrt(delta)] si st(1) = [-b] - [sqrt(delta)] fld A_ ; incarca a fld1 ; incarca 1 fld1 ; incarca 1 fadd ; 1+1= 2 fmul ; st(0) = 2*a fld st ; fdivp st(2),st ; imparte si pop fdivp st(2),st ; -> st(0) = (((- + [sqrt(delta)])/2a) si st(1) = (((- - [sqrt(delta)])/2a) fstp x1 ; salveaza in x1, pop fstp x2 ; salveaza in x2 print chr$(13, 10) print "x1=" print real10$ (x1) ; print x1 print chr$(13, 10) print "x2=" print real10$ (x2) ; print x2 print chr$(13, 10) jmp gata delta_negativ: ; delta < 0 print chr$(13, 10) print "nu are solutii reale" print chr$(13, 10) gata: Ret satan EndP End start Resurse: X86 Instruction Listings - Wiki Art Of Assembly1 point
-
Creator: Matt Briggs & Frank Poz Lab Requirements: - Virtual machine software (VMWare is recommended). -Windows system with IDA Pro (Free 5.0 is acceptable). -Microsoft Visual Studio 2008 redistributable package. As we store more of our confidential information on our computers, from bank account credentials, to company secrets, the reward to risk ratio increases as has the number malware (malicious software) threats. While anti-virus and intrusion detection systems have improved over the years, nothing can substitute a skilled malware analyst when a business needs to understand and mitigate a network intrusion. This class picks up where the Introduction to Reverse Engineering of Software course left off, exploring how static reverse engineering techniques can be used to understand what a piece of malware does and how it can be removed Topics include: - Understanding common malware features and behavior - Defeating code armoring and obfuscation - Signature creation and applying prior analysis - Dynamic analysis tools and how they can aid static analysis Cuprins: Day 1 Part 1 Prerequisites Day 1 Part 2 Analysis Goals Day 1 Part 3 Triage, Tasks, and Tools Day 1 Part 4 Malware Lab Setup Day 1 Part 5 Analysis Methods Day 1 Part 6 Execution and Persistence Day 1 Part 7 Know Your Tools Day 1 Part 8 Generic RE Algorithm Day 1 Part 9 Data Encoding Day 1 Part 10 Data Encoding - Common Algorithms - Caesar Cipher & XOR + variants Day 1 Part 11 Data Encoding - Common Algorithms - Base64 Day 1 Part 12 Data Encoding - Common Algorithms - Crypto Day 1 Part 13 Data Encoding - Common Algorithms - Compression Day 1 Part 14 Data Encoding - Common Algorithms - String Obfuscation Day 1 Part 15 Data Decoding Day 1 Part 16 How a Debugger Works Day 1 Part 17 Malware Unpacking Day 1 Part 18 Day 1 Review Day 2 Part 1 Network Communications - Introduction & Finding the Code Day 2 Part 2 Network Communications - Command & Control, Indicators Day 2 Part 3 DLL Analysis Day 2 Part 4 Anti-Analysis Day 2 Part 5 Anti-Analysis Examples Day 2 Part 6 How CreateFile() Works Day 2 Part 7 Shellcode Analysis Materials(lecture, malware sample, scripts): ReverseEngineeringMalware Video: curs oferit de: opensecuritytraining.info1 point