This shows you the differences between two versions of the page.
cns:lectures:lecture-08 [2013/10/07 12:49] 127.0.0.1 external edit |
cns:lectures:lecture-08 [2019/12/07 14:07] (current) razvan.deaconescu [Demo] |
||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== Lecture 08 - Password Breaking ====== | + | ====== Lecture 08 - Code Reuse (part 1) ====== |
- | *[[http://elf.cs.pub.ro/cns/res/lectures/lecture-08.pdf | Slides]] | + | * [[http://elf.cs.pub.ro/cns/res/lectures/08-code-reuse-1-handout.pdf | Slides]] |
- | ***Keywords**: password, length, character set, password strength, password cracking, password hash, dictionary attack, brute force, hybrid attack, rainbow tables, salt, power, efficiency | + | * **Keywords**: DEP, code reuse, return-to-libc, ROP, ROP gadget, ROP chain, ''ROPgadget'' |
<html> | <html> | ||
- | <iframe src="http://docs.google.com/viewer?url=http://elf.cs.pub.ro/cns/res/lectures/lecture-08.pdf&embedded=true" width="600" height="470" style="border: none;"></iframe> | + | <center> |
+ | <iframe src="https://docs.google.com/viewer?url=http://elf.cs.pub.ro/cns/res/lectures/08-code-reuse-1-handout.pdf&embedded=true" width="600" height="470" style="border: none;"></iframe> | ||
+ | </center> | ||
</html> | </html> | ||
+ | ===== Demo ===== | ||
+ | |||
+ | [[http://elf.cs.pub.ro/oss/res/lectures/08-code-reuse-1-demo.zip|Demo archive]] | ||
+ | |||
+ | /* | ||
+ | |||
+ | ====== Lecture 08 - Exploit Protection Mechanisms ====== | ||
+ | |||
+ | * [[http://elf.cs.pub.ro/cns/res/lectures/lecture-08.pdf|Slides]] | ||
+ | * **Keywords**: exploit, buffer overflow, shellcode, input validation, static analysis, dynamic analysis, code integrity, DEP, ASLR, PIC, PIE, canary value, stack guard | ||
+ | |||
+ | <html> | ||
+ | <center> | ||
+ | <iframe src="https://docs.google.com/viewer?url=http://elf.cs.pub.ro/cns/res/lectures/lecture-08.pdf&embedded=true" width="600" height="470" style="border: none;"></iframe> | ||
+ | </center> | ||
+ | </html> | ||
+ | |||
+ | */ |