Completed
Exploit Development
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
So Hopelessly Broken - The Implications of Pervasive Vulnerabilities in SOHO Routers
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Topics
- 3 Holy hole in the router, Batman!
- 4 Subject Background
- 5 Players in the SOHO Market
- 6 Evaluated SOHO Products
- 7 Why did we choose these routers?
- 8 Security Risks
- 9 Testing Methodology
- 10 Information Gathering
- 11 Scanning and Enumeration Cont.
- 12 Analyzing Web Applications Cont.
- 13 Analyzing Servers
- 14 Static Code Analysis
- 15 Fuzzing (Dynamic Analysis)
- 16 Analyze Fuzzing Results
- 17 Gaining Access Cont.
- 18 Reverse Engineering Toolz and Techniques
- 19 Exploit Development
- 20 Testing for Cross-Site Request Forgery
- 21 Testing for Command Injection
- 22 Command Injection - Vulnerable Code ?php
- 23 Command Injection Countermeasures
- 24 CSRF and Command Injection Demo
- 25 Directory Traversal #define: Directory Traversal is a form of attack where an attacker can access files and directories outside of the intended directory
- 26 Testing for Directory Traversal
- 27 Directory Traversal - Vulnerable Code ?php
- 28 Directory Traversal Countermeasures
- 29 Directory Traversal Demo
- 30 Testing for Buffer Overflows
- 31 Buffer Overflow - Vulnerable Code
- 32 Buffer Overflow Countermeasures
- 33 MIPS Architecture
- 34 ASUS RT-AC66U ROP Chain
- 35 MIPS Shellcode (RT-AC66U Exploit)
- 36 LIVE DEMO