Completed
The Weird Machine
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
The Anatomy of an Exploit
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Patricia Aas
- 3 The Weird Machine
- 4 The Weird State
- 5 The Mental Model
- 6 Exploit Development
- 7 Target Program
- 8 Program
- 9 CWE
- 10 Use of inherently dangerous function
- 11 Happy day scenario
- 12 Unhappy day scenario
- 13 Global Thermonuclear War
- 14 Stack Canary
- 15 Debug Build
- 16 Prefer C
- 17 Debug
- 18 Stack variables
- 19 Short string
- 20 Control
- 21 Automate
- 22 Fixing C
- 23 Stack Buffer Overflow
- 24 SLR Address Layout
- 25 Pattern Offset
- 26 Shellcode
- 27 Exploit Framework II
- 28 Code Size
- 29 STrace
- 30 Shell Code
- 31 Shut Sea
- 32 Inline Assembly
- 33 Calling Convention
- 34 Character Buffers
- 35 Shell
- 36 Pipe
- 37 Cheating
- 38 Weird States
- 39 deterministically correct