This Is Course Is Under Development skybulkctf@gmail.com
-
- [What is a Vulnerability?]
- [What is a Poc (Proof of Conecpt)?]
- [What is an Exploit?]
- [What is a Zero Day Exploit?]
-
- [Data Types and Basic Operations]
- [Signed and Unsigned Integers]
- [How Are Data Stored in Memory?]
- [Common Instructions]
- [Jmp]
- [Cmp]
- [Call]
- [Mov]
- [Type Conversion]
- [Control Flow Transfer]
- [Registers]
- [What Are They?]
- [Memory Layout]
- [Stack]
- [Heap]
- [Data Segment]
- [Text]
- [Data Types and Basic Operations]
-
- [Introduction]
- [Determine File Format]
- [Ida: Basics: Intro]
- [How to Attach a File]
- [Starting out]
- [Ida: Basic Blocks]
- [What Are They?]
- [Ida: Cross References]
- [Finding the Main Function]
- [Ida: Stack Frame View]
-
- [Software Vulnerabilities]
- [CWE-121 Stack-based Buffer Overflow]
- [CWE-190: Integer Overflow or Wraparound]
- [CWE-122: Heap-based Buffer Overflow]
- [CWE-416 Use After Free]
- [Techniques to Secure Code Review]
- [Regular Expressions]
- [Automating Vulnerability Analysis Using Ida Python]
- [Software Vulnerabilities]
-
- [Introduction]
- [What is a Debugger?]
- [How the Debugger Works]
- [Install Windbg & Setting up the symbols]
- [Debugger Basics]
- [Checking the Loaded Modules]
- [Searching in the memory]
- [Breakpoints]
- [Unassemble instructions]
- [Inspecting the Memory]
- [Solving Real Life Problems]
- [Stack Overflow Case]
- [Introduction]
-
- [What is Fuzzing?]
- [Type of Fuzzers]
- [Mutation-based]
- [Objectives]
- [Dumb Fuzzing]
- [Example]
- [Generation-based]
- [Objective]
- [Introduction to Xml]
- [Generation Fuzzing]
- [Example]
- [Introduction]
- [preparation stage]
- [Vulnerability Exploitation]
- [Replicating the Vulnerability]
- [Controlling EIP / SEH Handler]
- [Locating Space for Your Shellcode]
- [Checking for Bad Characters]
- [Hijacking Execution]
- [Common Instructions]
- [Exploiting the Vulnerability (demo)]
-
- [Introduction]
- [What is Structured Exception Handling and How It Works?]
- [What is Teb?]
- [Teb Overall Structure]
- [What is Tib ?]
- [Tib Structure]
- [SEH Chain]
- [Observing the Seh Chain ]
- [Why Do I Need Pop Pop Ret?]
- [Exploiting Seh Under X86 Process]
- [Finding POP POP RET gadgets]
- [Exploiting the Vulnerability (Demo)]
- [Introduction]
-
- Getting Started
- [what is Logical error?]
- [What is an Integer Overflow?]
- [Integer Overflow vulnerability (stack-based)]
- Exploiting an integer overflow
- [Identifying the core problem]
- [Triggering the vulnerability]
- [Defeating Stack Guard]
- [Fixing Offsets]
- [Arbitrary code execution]
- Getting Started
whats next?
- ASLR(various techniques to leak)
- DEP(various techniques)
- heap overflow
- UAF