Usr6 Posted June 12, 2013 Report Posted June 12, 2013 (edited) Lecture 1: Intro, Ethics, & Overview:This lecture covers the course Intro, syllabus review, distinction between hacking vs. penetration testing, ethics discussion, course motivation, threat models and some of the basics.Lecture 2: Linux Overview:This lecture covers the basics to an OS, Kernel vs user space, system calls, unix permissions, ruid vs euid etc..., ext file system (for the limited focus of forensics), persistence mechanisms used by malware, and /var/log, and more.Lecture 3: Windows OverviewThis lecture provides an overview of the registry and registry hives, persistence mechanisms used by malware, Portable Executable (PE) file format overview, window systems calls commonly used by malware, and the windows API.Lecture 4: Rootkits; Code AuditingThe first half of this lecture covers rootkits and rootkit techniques for windows and linux. The second half covers code auditing concepts like design flaws, software analysis, vulnerability identification, signed bugs (int over/under flows), incorrect use of length params (strncpy, strncat, snprintf), format strings, …Lecture 5: x86 Reverse engineeringThis lecture is day one of our weeklong x86 reverse engineering workshop lead by guest lecturer Mitch Adair.Lecture 6:This lecture is day two of our weeklong x86 reverse engineering workshop lead by guest lecturer Mitch Adair.Lecture 7: Fuzzing and Exploit Development 101This lecture covers a fuzzing overview, the basics of exploit development, environment variables, stack attacks, buffer overflow, nop-sleds, etc...Lecture 8: Shellcode and Exploit Development 102Lectore topics: more on writing Shellcode (linux vs windows), win32 process memory map ...Lecture 9: Exploit Development 103: SEH Exploitation, Heap Sprays, and Executable Security MechanismsThis lecture covers SEH exploitation, heap sprays, and executable security mechanisms like ASLR, DEP/NX, Stack Cookies...Lecture 10: Networking 101: Data Layer, Link Layer, and IP layerThis lecture covers an overview of networking concepts and network security concepts. Topics covered: Wireshark, Nmap, nc, Hubs vs switches vs routers, manufacturer default logins / backdoors... ARP & dns (dnssec), proxies, weak IP vs strong IP model (RFC 1122)Lecture 11: Networking 102: TCP layer, Important Protocols, Services, Portscanning, ARPThis lecture finishes up the networking overview from last time.Lecture 12: Web application Hacking 101Its a bit shorter than other videos as the class time was taken up going over homework beforehand. This lecture addresses some of the big picture with the topics covered so far, and moves into web application security topics.Lecture 13: Web Application Hacking 102: Big picture of topics so far, SQLi, XSSThis lecture's topices cover HTTP proxies, SQLi and XSSLecture 14: Web Application Hacking 103: SSL attacks, advanced techniquesThis lecture's topics cover SSL/TLS, Certificate Authorities, and the serious problems with the Certificate Authority infrastructure, and a history of CA hacks / breaches, and SSL hacking tools like sslstrip ...Lecture 15: Web Application Hacking 104 & Exploit Development 104This class was two lectures in one. In the web application 104 lecture we cover topics like WAF, and IDS and how to evade them - which leads into the exploit development 104 lecture. In the exploit dev 104 section we cover topics like networking shellcode, polymorphic shellcode / encoders, and the methodology for defeating IDS/WAFLecture 16: Midterm review & Exploit Development 105 (ROP)This lecture's first half is a review of topics for the midterm. The second half introduces Return Oriented Programming.Lecture 17: The Modern History of Cyber WarfareThis lecture covers just a small sample of the major events one might consider part of the history of cyber warfare. The lecture discusses some of the potential tactical and strategic differences between traditional warfare and cyber warfare - as well as the policy and perspective hurdles we face today. This lecture happened shortly after the ground-breaking APT1 report from Mandiant.Lecture 18: Social EngineeringThe first portion of this video is a continuation of the previous lecture on cyber warfare. Afterwards, this lecture offers a new spin on social engineering - by staring with fundamental psychological flaws in the human brain, and discussing how they can be exploited...Lecture 19: MetasploitThis lecture covers the metasploit framework, its interfaces, basic usage, and some of its utilities, along with a brief discussion of the social-engineering toolkit (SET)...Lecture 20: Meterpreter and Post ExploitationThis lecture starts by finishing the SET discussion from last time, covers Windows access-tokens, then delves into meterpreter and post exploitation...Lecture 21: Volatility and Incident Response:This lecture covers an overview of Incident Response and delves into Volatility and memory analysis..Lecture 22: Physical Security Workshop: Lockpicking, USB mischief, and BacNET/SCADA system securityThis lecture covers physical security, with a hands-on workshop on lockpicking, along with a simultaneous discussion of USB-related-mischief, building hacking (BacNET / SCADA) ....Lectures & Videos: Offensive Security Home Page (CIS 4930 / CIS 5930) Spring 2013Videos: https://www.youtube.com/user/gtg051x/videos?sort=da&view=0&flow=listCurs oferit de Florida State University Edited June 12, 2013 by Usr6 1 Quote
GoguMic Posted July 1, 2013 Report Posted July 1, 2013 Video download URLError (509)This account's public links are generating too much traffic and have been temporarily disabled! Are cineva vreun link nou ? Quote
WarLord Posted July 2, 2013 Report Posted July 2, 2013 Ar trebuie cineva sa faca download complet si sa puna pe BitTorrent. E mai rapid! Quote
Usr6 Posted July 2, 2013 Author Report Posted July 2, 2013 Torrent: Offensive Security 2013 - FSU - Download - 4shared - Michael HuHomework pack from course(4.5 mb): Multiupload.nl - upload your files to multiple file hosting sites!All slides/binaries/and other stuff in pack (38mb): Multiupload.nl - upload your files to multiple file hosting sites!credite pt linkuri: mangotown, 0xdraven Quote