Completed
Directory Traversal #define: Directory Traversal is a form of attack where an attacker can access files and directories outside of the intended directory
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
So Hopelessly Broken - The Implications of Pervasive Vulnerabilities in SOHO Routers
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Topics
- 3 Holy hole in the router, Batman!
- 4 Subject Background
- 5 Players in the SOHO Market
- 6 Evaluated SOHO Products
- 7 Why did we choose these routers?
- 8 Security Risks
- 9 Testing Methodology
- 10 Information Gathering
- 11 Scanning and Enumeration Cont.
- 12 Analyzing Web Applications Cont.
- 13 Analyzing Servers
- 14 Static Code Analysis
- 15 Fuzzing (Dynamic Analysis)
- 16 Analyze Fuzzing Results
- 17 Gaining Access Cont.
- 18 Reverse Engineering Toolz and Techniques
- 19 Exploit Development
- 20 Testing for Cross-Site Request Forgery
- 21 Testing for Command Injection
- 22 Command Injection - Vulnerable Code ?php
- 23 Command Injection Countermeasures
- 24 CSRF and Command Injection Demo
- 25 Directory Traversal #define: Directory Traversal is a form of attack where an attacker can access files and directories outside of the intended directory
- 26 Testing for Directory Traversal
- 27 Directory Traversal - Vulnerable Code ?php
- 28 Directory Traversal Countermeasures
- 29 Directory Traversal Demo
- 30 Testing for Buffer Overflows
- 31 Buffer Overflow - Vulnerable Code
- 32 Buffer Overflow Countermeasures
- 33 MIPS Architecture
- 34 ASUS RT-AC66U ROP Chain
- 35 MIPS Shellcode (RT-AC66U Exploit)
- 36 LIVE DEMO