ECOS Offensive Security Research Logbook

ECOS Offensive Security Research Logbook

BruCON Security Conference via YouTube Direct link

Stack Location

28 of 53

28 of 53

Stack Location

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

ECOS Offensive Security Research Logbook

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Disclaimers
  3. 3 About me
  4. 4 Battle plan
  5. 5 Extracting Firmware
  6. 6 Shell
  7. 7 Device Profile
  8. 8 Device Content
  9. 9 Cleanup
  10. 10 Load in Gydra
  11. 11 R2 Pipe
  12. 12 Function Offsets
  13. 13 Broadcom
  14. 14 Firmware dump
  15. 15 Header format
  16. 16 Program store
  17. 17 Plan
  18. 18 Signature Libraries
  19. 19 Function ID databases
  20. 20 Functions signatures
  21. 21 Function tracing
  22. 22 Function naming
  23. 23 Vtable
  24. 24 Rename Vtables
  25. 25 Address of vectors
  26. 26 Data segment identification
  27. 27 Firmware Offset
  28. 28 Stack Location
  29. 29 Stack Base Address
  30. 30 Memory Map
  31. 31 Memory Map offsets
  32. 32 Bugs
  33. 33 Memory Corruption
  34. 34 Store Copy
  35. 35 Parental Control Page
  36. 36 Storycuts
  37. 37 Heap Overflow
  38. 38 Device Crash
  39. 39 Drop Chain
  40. 40 Recap
  41. 41 Netgear
  42. 42 Exploit
  43. 43 Shellcode
  44. 44 Linker
  45. 45 Persistence
  46. 46 Implant
  47. 47 Bootkit
  48. 48 Persistence Demonstration
  49. 49 Recommendations
  50. 50 IP Manager
  51. 51 Future work
  52. 52 Open source
  53. 53 References

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.