Outils pour utilisateurs

Outils du site


wiki:presentations

Différences

Ci-dessous, les différences entre deux révisions de la page.

Lien vers cette vue comparative

Les deux révisions précédentes Révision précédente
Prochaine révision
Révision précédente
wiki:presentations [2014/03/06 21:08]
x86
wiki:presentations [2014/03/14 19:09] (Version actuelle)
x86
Ligne 3: Ligne 3:
 You'd like to become a security ninja but don't know what kind of projects are good for you? Here are a list of little projects that you could maybe present at securinlille ;)  You'd like to become a security ninja but don't know what kind of projects are good for you? Here are a list of little projects that you could maybe present at securinlille ;) 
  
-However, BYOI! (Bring Your Own Ideas)+However, BYOI! (Bring Your Own Ideas).
  
-===== Exploit ​=====+====== Essential ======
  
-==== Youngling ==== +  ​x86 assembly 101 
-   +  * Debugging GNU/Linux programs 
-  ​Stack buffer overflows. Show a PoC (Proof of Concept)! +  * Debugging Windows programs
-  * Integer overflows. Show a PoC (Proof of Concept)! +
-  * Format strings. Show a PoC (Proof of Concept)! +
-  * Can you smash the stack? (http://​smashthestack.org/​) Show a solution for a level!+
  
-==== Young padawan ​====+====== Upcoming ======
  
-  * Pwning EasyRmToMP3 Converter (www.corelan.be exploit writing tutorial 1) +df0 
-  * Pwning some toy Windows kernel device drivers (https://​github.com/​0vercl0k/​Windows-Kernel-Flaws)+
  
-===Introduction== Reverse ​ =====+x86 
  
-  * No-cd for Morrowind ​+kartoch
  
 +fser
  
-====== Upcoming ====== +you
- +
-df0 +
-x86+
  
 ====== Past ====== ====== Past ======
  
 There are no previous presentations because we are lazy.  There are no previous presentations because we are lazy. 
 +
 +===== Exploit =====
 +  * Stack buffer overflows. Show a PoC (Proof of Concept)!
 +  * Integer overflows. Show a PoC (Proof of Concept)!
 +  * Format strings. Show a PoC (Proof of Concept)!
 +  * Write-what-were vulnerabilities. Show a PoC (Proof of Concept)!
 +  * Can you smash the stack? (http://​smashthestack.org/​) Show a solution for a level!
 +  * NX / DEP
 +  * ASLR
 +  * Stack cookies
 +  * Return Oriented Programming
 +  * Pwning EasyRmToMP3 Converter (www.corelan.be exploit writing tutorial 1)
 +  * Pwning some toy Windows kernel device drivers (https://​github.com/​0vercl0k/​Windows-Kernel-Flaws)
 +
 +===== Reverse =====
 +  * Present level0 crackme on crackmes.de
 +  * Present your write-up for bluehat reverse-1
 +  * No-cd for Morrowind (no anti-reverse)
 +  * Obfuscate programs with code flattening (hint: it was presented to HECI students) ​
 +  * Ptrace anti-debugging trick
 +  * Nanomites ​
 +  * Code morphing
 +
 +===== Malwares =====
 +  * Hide processes and files with a Windows kernel rootkit ​
 +  * Virii 101 (Giant Black Book of Computer Viruses, Virus : théorie, pratique et applications) ​
 +
 +===== Peering inside ... =====
 +  * x86 segmentation and pagination
 +  * How to develop basic device drivers for [insert an OS]
 +  * Syscall filtering with ptrace
 +  * Programming a sandbox for the Linux kernel
 +  * Linux slab allocator
 +  * Fuzzgrind, fuzzing using symbolic executions
 +  * Z3, the microsoft solver ​
 +  * Automated reverse engineering with KLEE symbolic virtual machine
 +  * What makes it page? The story of the Windows virtual memory manager
 +  * Virtualization for dummes
 +  * x86 virtual machine extensions
 +  * Differences between x86 and ARM
 +  * Debugging the windows kernel with windbg
 +  * Debugging the linux kernel with kdb
 +  * Communication to drivers with IOCTL 
 +  * Windows startup
 +  * Inside UEFI
wiki/presentations.1394136496.txt.gz · Dernière modification: 2014/03/06 21:08 par x86