Outils pour utilisateurs

Outils du site


wiki:presentations

Différences

Ci-dessous, les différences entre deux révisions de la page.

Lien vers cette vue comparative

Les deux révisions précédentes Révision précédente
Prochaine révision
Révision précédente
wiki:presentations [2014/03/06 22:07]
x86
wiki:presentations [2014/03/14 19:09] (Version actuelle)
x86
Ligne 3: Ligne 3:
 You'd like to become a security ninja but don't know what kind of projects are good for you? Here are a list of little projects that you could maybe present at securinlille ;)  You'd like to become a security ninja but don't know what kind of projects are good for you? Here are a list of little projects that you could maybe present at securinlille ;) 
  
-However, BYOI! (Bring Your Own Ideas)+However, BYOI! (Bring Your Own Ideas)
 + 
 +====== Essential ====== 
 + 
 +  * x86 assembly 101 
 +  * Debugging GNU/Linux programs 
 +  * Debugging Windows programs 
 + 
 +====== Upcoming ====== 
 + 
 +df0  
 + 
 +x86  
 + 
 +kartoch 
 + 
 +fser 
 + 
 +you 
 + 
 +====== Past ====== 
 + 
 +There are no previous presentations because we are lazy. 
  
 ===== Exploit ===== ===== Exploit =====
-  ​ 
   * Stack buffer overflows. Show a PoC (Proof of Concept)!   * Stack buffer overflows. Show a PoC (Proof of Concept)!
   * Integer overflows. Show a PoC (Proof of Concept)!   * Integer overflows. Show a PoC (Proof of Concept)!
   * Format strings. Show a PoC (Proof of Concept)!   * Format strings. Show a PoC (Proof of Concept)!
 +  * Write-what-were vulnerabilities. Show a PoC (Proof of Concept)!
   * Can you smash the stack? (http://​smashthestack.org/​) Show a solution for a level!   * Can you smash the stack? (http://​smashthestack.org/​) Show a solution for a level!
 +  * NX / DEP 
 +  * ASLR 
 +  * Stack cookies 
 +  * Return Oriented Programming
   * Pwning EasyRmToMP3 Converter (www.corelan.be exploit writing tutorial 1)   * Pwning EasyRmToMP3 Converter (www.corelan.be exploit writing tutorial 1)
   * Pwning some toy Windows kernel device drivers (https://​github.com/​0vercl0k/​Windows-Kernel-Flaws)   * Pwning some toy Windows kernel device drivers (https://​github.com/​0vercl0k/​Windows-Kernel-Flaws)
Ligne 17: Ligne 42:
 ===== Reverse ===== ===== Reverse =====
   * Present level0 crackme on crackmes.de   * Present level0 crackme on crackmes.de
-  * No-cd for Morrowind ​+  ​* Present your write-up for bluehat reverse-1 
 +  ​* No-cd for Morrowind ​(no anti-reverse) 
 +  * Obfuscate programs with code flattening (hint: it was presented to HECI students)  
 +  * Ptrace anti-debugging trick 
 +  * Nanomites  
 +  * Code morphing
  
 +===== Malwares =====
 +  * Hide processes and files with a Windows kernel rootkit ​
 +  * Virii 101 (Giant Black Book of Computer Viruses, Virus : théorie, pratique et applications) ​
  
-====== Upcoming ====== +===== Peering inside ... ===== 
- +  * x86 segmentation and pagination 
-df0 +  * How to develop basic device drivers for [insert an OS] 
-x86 +  * Syscall filtering with ptrace 
- +  * Programming a sandbox for the Linux kernel 
-====== Past ====== +  * Linux slab allocator 
- +  * Fuzzgrind, fuzzing using symbolic executions 
-There are no previous presentations because we are lazy. +  * Z3, the microsoft solver  
 +  * Automated reverse engineering with KLEE symbolic virtual machine 
 +  * What makes it page? The story of the Windows virtual memory manager 
 +  * Virtualization for dummes 
 +  ​* ​x86 virtual machine extensions 
 +  * Differences between x86 and ARM 
 +  * Debugging the windows kernel with windbg 
 +  * Debugging the linux kernel with kdb 
 +  * Communication to drivers with IOCTL  
 +  * Windows startup 
 +  * Inside UEFI
wiki/presentations.1394140052.txt.gz · Dernière modification: 2014/03/06 22:07 par x86