This shows you the differences between two versions of the page.
|
cns:lectures:lecture-05 [2014/11/14 11:31] lucian.mogosanu |
cns:lectures:lecture-05 [2019/10/27 12:30] (current) razvan.deaconescu |
||
|---|---|---|---|
| Line 1: | Line 1: | ||
| - | ====== Lecture 05 - Exploiting ====== | + | ====== Lecture 05 - Exploiting. Shellcodes (part 2) ====== |
| - | * [[http://elf.cs.pub.ro/cns/res/lectures/lecture-05.pdf | Slides]] | + | * [[http://elf.cs.pub.ro/cns/res/lectures/05-exploiting-2-handout.pdf|Slides]] |
| - | * **Keywords**: bugs, vulnerabilities, exploit, shellcode, shellcode construction, shellcode triggering, shellcode placing, syscall, string formatting, null, alphanumeric shellcode, stack buffer overflow, heap buffer overflow, return-to-libc, return-oriented programming, metasploit | + | * **Keywords**: shellcode data, jump-call trick, alphanumeric shellcode, environment variable, string format attack, return-to-libc, pwntools, shellcraft, data packing, pwntools tubes |
| <html> | <html> | ||
| - | <iframe src="http://docs.google.com/viewer?url=http://elf.cs.pub.ro/cns/res/lectures/lecture-05.pdf&embedded=true" width="600" height="470" style="border: none;"></iframe> | + | <center> |
| + | <iframe src="https://docs.google.com/viewer?url=http://elf.cs.pub.ro/cns/res/lectures/05-exploiting-2-handout.pdf&embedded=true" width="600" height="470" style="border: none;"></iframe> | ||
| + | </center> | ||
| </html> | </html> | ||
| - | |||