How to Cook Cisco: Exploit Development for Cisco IOS - George Nosenko - Ekoparty Security Conference - 2017

How to Cook Cisco: Exploit Development for Cisco IOS - George Nosenko - Ekoparty Security Conference - 2017

Ekoparty Security Conference via YouTube Direct link

Omelet Egg Hunter (192 bytes)

27 of 36

27 of 36

Omelet Egg Hunter (192 bytes)

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

How to Cook Cisco: Exploit Development for Cisco IOS - George Nosenko - Ekoparty Security Conference - 2017

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Cisco Exploitation Milestones
  3. 3 Cisco Diversity
  4. 4 Our Target
  5. 5 Vulnerability
  6. 6 Mitigations
  7. 7 Common Steps to Arbitrary Code Execution
  8. 8 Cisco IOS Debugging
  9. 9 Gain Control
  10. 10 DEP Bypass Techniques
  11. 11 Return Oriented Programming (PowerPC)
  12. 12 Multitask Gadget
  13. 13 Multiload Gadget
  14. 14 How To Disable DEP
  15. 15 How does DEP work on PowerPC ?
  16. 16 PowerPC 405: TLB Entry
  17. 17 PowerPC 405: Zone Protection Register
  18. 18 PowerPC 405: DEP Disable Gadget
  19. 19 PowerPC 405: DEP Disable Chain
  20. 20 PowerPC e500: TLB Entries
  21. 21 PowerPC e500: DEP Disable Gadget
  22. 22 Staged Shellcode
  23. 23 Shellcode hunting
  24. 24 10-Memory structure
  25. 25 Packet Fragmentation
  26. 26 The caches invalidation
  27. 27 Omelet Egg Hunter (192 bytes)
  28. 28 Checking Code Integrity
  29. 29 Code Integrity Checking Bypass
  30. 30 Free Space Between Regions
  31. 31 Writing Shellcode on the C language
  32. 32 Image-independent shellcodes
  33. 33 Completion of the shellcode
  34. 34 Infinite Loop: Watch-Dog Bypass
  35. 35 ARBITRARY CODE EXECUTION: GEEKPWN CASE
  36. 36 Demo

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.