Day 1 Part 1: Exploits1: Introduction to Software Exploits

preview_player
Показать описание
Follow us on Twitter for class news @OpenSecTraining.

Software vulnerabilities are flaws in program logic that can be leveraged by an attacker to execute arbitrary code on a target system. This class will cover both the identification of software vulnerabilities and the techniques attackers use to exploit them. In addition, current techniques that attempt to remediate the threat of software vulnerability exploitation will be discussed.

This will be a lab driven class where specific software vulnerability types in particular environments are discussed and then exploited in a lab setting. Examples of lab components of the class as well as specific topics covered include:
•Shellcode development
•Stack overflow exploitation
•Heap overflow exploitation
•Static source code analysis
•Defeating non-executable stack protection

This class by Corey K. will help students be more aware of the specific details and mechanisms of software exploits we see in the wild. This knowledge will enable the students to better analyze their own software for vulnerabilities in an effort to produce more secure code.
Рекомендации по теме
Комментарии
Автор

Incredible content throughout.  Who puts such content out on YT for free?  Many, many, many thanks to Open Security Training for all of this. 

maxschlepzig
Автор

I really enjoyed watching this video, but maybe you could think about using a microphone taped to his/your shirt or something like that. It's kinda hard to understand if english isn't your native language.

MyEden
Автор

Tcc generates AT&T assembly syntax by default. How come it is compiling as an intel asm? Clearly doubt they customized tcc or used asm translators

dagonmeister
Автор

Anyone have issues starting the VM?> I increased the VM resources and it still takes like 30 minutes for the LILO boot loader to load the linux terminal.

brendanortiz
Автор

This is a kind of optimization done by the compiler. I can just guess, but I think that this is faster on a modern CPU because arithemtic can be done easier with 16 Byte aligned addresses.
You can use tcc instead to avoid those optimizations.

Technoblade
Автор

Trying to extract the slackware VM from the site and it says that it needs 698GB of space. Is that right?

MacR
Автор

It would be awesome if they posted the times for each exploit.

cor
Автор

Does this course help in identifying vulnerabilities in real world softwares ?

abhinavthakur
Автор

why when i run that simple login error shows up

houba
Автор

Can someone explan what is the address of the lines mean ? 4 * 4 byte address getting printed so they have to be stored somewhere .is it that address which stores these values by gdb?

kishoresuri
Автор

When i try to execute simple login pw must be entered help plz

houba
visit shbcf.ru