Q-version Buffer Overflow Tutorial - Scene Tutorial
Upload User: mozhenmi
Upload Date: 2024-11-18
Package size: 11k
Downloads: 0
Category:

Proxy Server

Development Platform:

Code Price: 10 Coin Credit Rule     Buy Credits
Detail: Table of Contents | t/4 Preface | t/6 Author Introduction | t/6 Main Role Introduction | t/6 Reading Guide | t/6 Chapter 1, Introduction to Stack Overflow in Windows | t/8 1.1 Dream, Already Expanded | t/8 1.2 Beer and Cup - Buffer Overflow Principle | t/8 1.3 Mysterious Windows System | t/10 1.4 ShellCode Writing Introduction | t/17 1.5 Glimpse a Leopard Spot - Simple Utilization of Local Buffer Overflow | t/21 1.6 Summary - Taken from Xiaoqiang's Diary | t/28 |/n1.7 First Practical Experience - FoxMail Overflow Vulnerability Writing | t/29 1.8 Bullblade Trial - Printer Overflow Vulnerability Writing | t/41 1.9 JMP/ALL EBX - Another Overflow Exploiting Method | t/42 1.10 Step Up - IDA/IDQ Overflow Vulnerability Writing | t/55 After class Explanation | t/58 Chapter 2, Preliminary ShellCode Writing on Windows | t/60 2.1 What is ShellCode| T/60 2.2 Simple Example - Writing ShellCode for Console Windows | t/63 2.3 Preliminary Analysis of ShellCode Universality | t/78 2.4 Pop up Windows Dialogue Box ShellCode Writing | t/82 2.5 Add User ShellCode Writing | t/88 After class Explanation | t/98 Chapter 3, Backdoor Writing and ShellCode Extraction | t/100 3.1 Preparatory Knowledge | t/101 3.2 Backdoor Overall Ideas | t/121 3.3 Telnet High level language implementation of backdoor | t/125 3.4 generates ShellCode | t/136 3.5 further exploration | t/156 3.6 writing ShellCode for reverse backdoor | t/160 post class explanation | t/166 Chapter 4 programming for heap overflow exploitation in Windows | t/168 4.1 heap overflow exploration | t/168 4.2 RtlAllcoateHeap errors | t/170 4.3 instance - exploitation of Message heap overflow vulnerability | t/191 4.4 RtlFreeHeap errors | t/197 4.5 other ways of exploiting heap overflow | t/204 4.6 instance - JPEG processing of heap overflow vulnerability The use of | t/208 post class puzzle | t/215 Chapter 5 ShellCode deformation encoding method | t/217 5.1 Why encode | t/217 5.2 Simple encoding - XOR method | t/221 5.3 Simple deformation - fine-tuning method | t/231 5.4 Direct replacement method | t/233 5.5 Character splitting method | t/239 5.6 Memory search method |T/247 5.7 Search instance - exploitation of Serv-U vulnerability | t/249 5.8 "Computing with you" - Computing&Society | t/257 Post class troubleshooting | t/258 Chapter 6 Advanced Techniques for ShellCode Writing | t/260 6.1 Writing of Universal ShellCode | t/260 6.2 Efficient Extraction Techniques for ShellCode | t/285 6.3 Advanced Features of ShellCode | t/294 After class Explanation | t/305 Chapter 7, Vulnerability Discovery, Analysis, and Utilization | t/308 7.1 CCProxy Vulnerability Analysis | t/308 7.2 Black Box Method for Vulnerability Detection and Python Script | t/319 7.3 White Box Method and IDA Analysis Vulnerability | t/333
This package does not include any code with text format which can display in web page, please download the package.