Outils pour utilisateurs

Outils du site


wiki:presentations

Ideas

You'd like to become a security ninja but don't know what kind of projects are good for you? Here are a list of little projects that you could maybe present at securinlille ;)

However, BYOI! (Bring Your Own Ideas).

Essential

  • x86 assembly 101
  • Debugging GNU/Linux programs
  • Debugging Windows programs

Upcoming

df0

x86

kartoch

fser

you

Past

There are no previous presentations because we are lazy.

Exploit

  • Stack buffer overflows. Show a PoC (Proof of Concept)!
  • Integer overflows. Show a PoC (Proof of Concept)!
  • Format strings. Show a PoC (Proof of Concept)!
  • Write-what-were vulnerabilities. Show a PoC (Proof of Concept)!
  • Can you smash the stack? (http://smashthestack.org/) Show a solution for a level!
  • NX / DEP
  • ASLR
  • Stack cookies
  • Return Oriented Programming
  • Pwning EasyRmToMP3 Converter (www.corelan.be exploit writing tutorial 1)
  • Pwning some toy Windows kernel device drivers (https://github.com/0vercl0k/Windows-Kernel-Flaws)

Reverse

  • Present level0 crackme on crackmes.de
  • Present your write-up for bluehat reverse-1
  • No-cd for Morrowind (no anti-reverse)
  • Obfuscate programs with code flattening (hint: it was presented to HECI students)
  • Ptrace anti-debugging trick
  • Nanomites
  • Code morphing

Malwares

  • Hide processes and files with a Windows kernel rootkit
  • Virii 101 (Giant Black Book of Computer Viruses, Virus : théorie, pratique et applications)

Peering inside ...

  • x86 segmentation and pagination
  • How to develop basic device drivers for [insert an OS]
  • Syscall filtering with ptrace
  • Programming a sandbox for the Linux kernel
  • Linux slab allocator
  • Fuzzgrind, fuzzing using symbolic executions
  • Z3, the microsoft solver
  • Automated reverse engineering with KLEE symbolic virtual machine
  • What makes it page? The story of the Windows virtual memory manager
  • Virtualization for dummes
  • x86 virtual machine extensions
  • Differences between x86 and ARM
  • Debugging the windows kernel with windbg
  • Debugging the linux kernel with kdb
  • Communication to drivers with IOCTL
  • Windows startup
  • Inside UEFI
wiki/presentations.txt · Dernière modification: 2014/03/14 19:09 par x86