The Anatomy of an Exploit

The Anatomy of an Exploit

ACCU Conference via YouTube Direct link

Weird States

38 of 39

38 of 39

Weird States

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

The Anatomy of an Exploit

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Patricia Aas
  3. 3 The Weird Machine
  4. 4 The Weird State
  5. 5 The Mental Model
  6. 6 Exploit Development
  7. 7 Target Program
  8. 8 Program
  9. 9 CWE
  10. 10 Use of inherently dangerous function
  11. 11 Happy day scenario
  12. 12 Unhappy day scenario
  13. 13 Global Thermonuclear War
  14. 14 Stack Canary
  15. 15 Debug Build
  16. 16 Prefer C
  17. 17 Debug
  18. 18 Stack variables
  19. 19 Short string
  20. 20 Control
  21. 21 Automate
  22. 22 Fixing C
  23. 23 Stack Buffer Overflow
  24. 24 SLR Address Layout
  25. 25 Pattern Offset
  26. 26 Shellcode
  27. 27 Exploit Framework II
  28. 28 Code Size
  29. 29 STrace
  30. 30 Shell Code
  31. 31 Shut Sea
  32. 32 Inline Assembly
  33. 33 Calling Convention
  34. 34 Character Buffers
  35. 35 Shell
  36. 36 Pipe
  37. 37 Cheating
  38. 38 Weird States
  39. 39 deterministically correct

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.