Jump to content
Nytro

Intro To Exploits - Series

Recommended Posts

Posted

Intro To Exploits - Part 1

http://www.youtube.com/watch?v=NzGB-8Sntqc&feature=player_embedded

Description: **This video and Part 2 Segment 1 are more lecture based videos**

What's in this video?

-Coding Practices

-Defining Functions of Interest

-Introduction To Shellcode

I recommend watching in full-screen due to quality issues. This is part 1 of 5. More to come over the next few weeks.

Also, sorry about how I was talking in the video, I'm not a strong speaker.

Sursa: Intro To Exploits - Part 1

Intro To Exploits - Part 2 (Shellcode)

http://www.youtube.com/watch?v=-QlaRVn1K1o&feature=player_embedded

Description: I recommend watching in full-screen due to quality issues. This is the first of two videos for part 2 of 5.

The topic of discussion for this video is an expanded explanation of shellcode.

-How shellcode is executed

-Architecture types

-Assembly/hex examples

Also, sorry about how I was talking in the video, I'm not a strong speaker.

Sursa: Intro To Exploits - Part 2 (Shellcode)

Intro To Exploits - Part 2 (Shellcode Cont.)

http://www.youtube.com/watch?v=m-AxrZxvu8o&feature=player_embedded

Description: ****This video demonstrates the concepts of how shellcode works****

I recommend watching in full-screen due to quality issues. This is the second of two videos for part 2 of 5.

This video expands even more on the previous video, and we end Part 2 with a visual example of how shellcode operates.

-Different purposes of shellcode

-Security evasion

-Visual example of shellcode in action (bind and reverse shells)

Sursa: Intro To Exploits - Part 2 (Shellcode Cont.)

Intro To Exploits - Part 3 (Fuzzing)

http://www.youtube.com/watch?v=v3wOMXZykrE&feature=player_embedded

Description: The topic of this video is fuzzing. At the end of Part 3, we fuzz a simple tcp echo server.

-Types of Fuzzers

-How to know if a fuzzer was successful

-Finding buffer size

I hope you learned a lot as fuzzing is very undocumented outside of the security industry, and the technique itself is more used for auditing many programs with a generic testing tool.

The downside of fuzzing is that it is very limited to what it can test, and how deep into a program it can test. Fuzzing is more for an entry point stress test, than it would be for full-on code auditing.

Sursa: Intro To Exploits - Part 3 (Fuzzing)

Intro To Exploits - Part 4 (Reverse Engineering)

http://www.youtube.com/watch?v=kMWc1PiKWUQ&feature=player_embedded

Description: ****Topic for the video is Reverse Engineering****

This video covers the basics of disassembling/reverse engineering. This is a great video, as I show you how to explore different functions within gdb. This is an awesome tactic for determining what a program might be able to do.

-Exploring the CPU

-Differentiating functions from other stack procedures

-Finding functions and disassembling them

-Finding return addresses

Reverse Engineering is a very broad category, and in its own right deserves its own video series. The steps I go through in this video are more for mapping out a program, rather than editing asm code to change execution flow.

Sorry for the pause half way through the video. I rage-quited half way through filming it.

Sursa: Intro To Exploits - Part 4 (Reverse Engineering)

Intro To Exploits - Part 5 (Scenario)

http://www.youtube.com/watch?v=5iUaq_H6wf8&feature=player_embedded

Description: ***This video is intended for learning purposes only. In no way, shape, or form, is the sole purpose of this video intended as a solution to the IO wargame.***

What's in this video?

In this video, we put together all of the information we have learned from the previous videos, and apply it to a practical (but very unlikely) buffer overflow situation.

-On the fly exploitation (IO smashthestack level 5)

Sursa: Intro To Exploits - Part 5 (Scenario)

[h=4]Intro To Exploits - Part 5 (Scenario Cont.)[/h]

http://www.youtube.com/watch?v=NzD67lD9OQU&feature=player_embedded

Description: ***This video is intended for learning purposes only. In no way, shape, or form, is the sole purpose of this video intended to be used as a solution to the IO wargame.***

This video concludes the previous video, and the series. I hope I have helped new people learn a lot, and refresh the memories of the more seasoned folks. Thank you for watching! :)

Sursa: http://www.securitytube.net/video/2649

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...