Outils pour utilisateurs

Outils du site


wiki:presentations

Différences

Ci-dessous, les différences entre deux révisions de la page.

Lien vers cette vue comparative

Les deux révisions précédentes Révision précédente
Prochaine révision
Révision précédente
wiki:presentations [2014/03/06 22:45]
x86
wiki:presentations [2014/03/14 19:09] (Version actuelle)
x86
Ligne 3: Ligne 3:
 You'd like to become a security ninja but don't know what kind of projects are good for you? Here are a list of little projects that you could maybe present at securinlille ;)  You'd like to become a security ninja but don't know what kind of projects are good for you? Here are a list of little projects that you could maybe present at securinlille ;) 
  
-However, BYOI! (Bring Your Own Ideas)+However, BYOI! (Bring Your Own Ideas)
 + 
 +====== Essential ====== 
 + 
 +  * x86 assembly 101 
 +  * Debugging GNU/Linux programs 
 +  * Debugging Windows programs 
 + 
 +====== Upcoming ====== 
 + 
 +df0  
 + 
 +x86  
 + 
 +kartoch 
 + 
 +fser 
 + 
 +you 
 + 
 +====== Past ====== 
 + 
 +There are no previous presentations because we are lazy. 
  
 ===== Exploit ===== ===== Exploit =====
Ligne 9: Ligne 31:
   * Integer overflows. Show a PoC (Proof of Concept)!   * Integer overflows. Show a PoC (Proof of Concept)!
   * Format strings. Show a PoC (Proof of Concept)!   * Format strings. Show a PoC (Proof of Concept)!
 +  * Write-what-were vulnerabilities. Show a PoC (Proof of Concept)!
   * Can you smash the stack? (http://​smashthestack.org/​) Show a solution for a level!   * Can you smash the stack? (http://​smashthestack.org/​) Show a solution for a level!
 +  * NX / DEP 
 +  * ASLR 
 +  * Stack cookies 
 +  * Return Oriented Programming
   * Pwning EasyRmToMP3 Converter (www.corelan.be exploit writing tutorial 1)   * Pwning EasyRmToMP3 Converter (www.corelan.be exploit writing tutorial 1)
   * Pwning some toy Windows kernel device drivers (https://​github.com/​0vercl0k/​Windows-Kernel-Flaws)   * Pwning some toy Windows kernel device drivers (https://​github.com/​0vercl0k/​Windows-Kernel-Flaws)
Ligne 19: Ligne 45:
   * No-cd for Morrowind (no anti-reverse)   * No-cd for Morrowind (no anti-reverse)
   * Obfuscate programs with code flattening (hint: it was presented to HECI students) ​   * Obfuscate programs with code flattening (hint: it was presented to HECI students) ​
 +  * Ptrace anti-debugging trick
 +  * Nanomites ​
 +  * Code morphing
  
 ===== Malwares ===== ===== Malwares =====
   * Hide processes and files with a Windows kernel rootkit ​   * Hide processes and files with a Windows kernel rootkit ​
 +  * Virii 101 (Giant Black Book of Computer Viruses, Virus : théorie, pratique et applications) ​
  
 ===== Peering inside ... ===== ===== Peering inside ... =====
Ligne 41: Ligne 71:
   * Windows startup   * Windows startup
   * Inside UEFI   * Inside UEFI
- 
-====== Upcoming ====== 
- 
-df0 
-x86 
- 
-====== Past ====== 
- 
-There are no previous presentations because we are lazy.  
wiki/presentations.1394142314.txt.gz · Dernière modification: 2014/03/06 22:45 (modification externe)