Proj 6: Exploiting a Format String Vulnerability (20 pts.) Proj 5: Using nasm, ld, and objdump (10 pts.) Proj 4: Remote Linux Buffer Overflow With Listening Shell (20 pts.) Proj 3: Linux Buffer Overflow With Shellcode (20 pts.) Proj 2: Linux Buffer Overflow Without Shellcode (20 pts.) Proj 1 (must renumber later): Linux Buffer Overflow With Command Injection Splash screen, use this version of Jasmin:ĭownload politically correct Jasmin without the cheescake Note: I now recommend using Kali 2.0 for the projects. If you don't want the drawing of a partially undressed woman on the Proj 1: Using Jasmin to run x86 Assembly Code (15 pts.) Lecture 7: Intro to 64-Bit Assembler (pptx) Windows Ch 6: The Wild World of Windows (pptx) Introduction to Exploitation: Linux on x86Ĭh 4: Introduction to format string bugs (pptx)Ĭh 5: Introduction to heap overflows (pptx) Last Class: TBA (Class will meet: the strike was cancelled) Preview of new course "Securing Web Applications" and two more servers to hack "The Shellcoder's Handbook: Discovering and Exploiting Security Holes ", by Chris Anley, John Heasman, Felix Lindner, Gerardo Richarte ASIN: B004P5O38Q Find stack overflow vulnerabilities and exploit themģ. Read and write basic assembly code routinesĢ. Student Learning Outcomes (measured to guide course improvements)ġ.
0 Comments
Leave a Reply. |