Completed
Attack Theory
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Advanced Buffer Overflow Techniques
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Attack Theory
- 3 Entry -vs- Effect
- 4 Injection Vector
- 5 Injector/Payload Pairs
- 6 Types of Injection
- 7 Who writes Injector Code?
- 8 How hard can it hit?
- 9 Buffer Overflow Injection
- 10 Challenges
- 11 Stack Injection
- 12 Address Housekeeping
- 13 Stack Overflow
- 14 Little and Big Endian
- 15 Where to put the payload
- 16 Confined Payload
- 17 Using more stack for payload
- 18 Large payload, Lowland address
- 19 A register points to the stack
- 20 Call thru a Register
- 21 Push a register then return
- 22 NOP Sled
- 23 Trespassing the HEAP
- 24 Overwrite the VTABLE
- 25 Overwrite VTABLE
- 26 Getting Bearings
- 27 XOR Protection
- 28 XOR again to decode
- 29 Hardcoded Function Calls
- 30 Pros/Cons to hard coding
- 31 Dynamic Function Loading
- 32 HASH Loading
- 33 Check CRC's