Recent changes
Login
Lecture 09 - Code Reuse (part 2)
Slides
Keywords
: multi-phase attack, ASLR bypass, ROP chain, stack pivoting
Demo
Demo archive
Calendar
Class Register
Lab Split
CNS Need to Know
News
Rules and Grading
Resources
Direct Access
Documentation
RSS Feed
Mailing List
The CNS Public Repository
Microsoft Teams
Virtual Machines
What to do after CNS
Labs
Lab 01 - Introduction. Basic Exploration Tools
Lab 02 - Program Analysis
Lab 03 - The Stack. Buffer Management
Lab 04 - Exploiting. Shellcodes
Lab 05 - Exploiting. Shellcodes (Part 2)
Lab 06 - Exploit Protection Mechanisms
Lab 07 - Strings
Lab 08 - Return-Oriented Programming
Lab 09 - Return-Oriented Programming (Part 2)
Lab 10 - Use After Free
Lab 11 - CTF Challenges (part 1)
Lab 12 - CTF Challenges (part 2)
Extra - Integers
Extra - Advanced Binary Analysis
Lectures
Lecture 01 - Introduction. Basic Exploration Tools
Lecture 02 - Program Analysis
Lecture 03 - The Stack. Buffer Management
Lecture 04 - Exploiting. Shellcodes
Lecture 05 - Exploiting. Shellcodes (part 2)
Lecture 06 - Exploit Protection Mechanisms
Lecture 07 - Strings. Information Leaks
Lecture 08 - Code Reuse (part 1)
Lecture 09 - Code Reuse (part 2)
Lecture 10 - Heap Exploitation
Lecture 11 - Exploit Demo 1
Lecture 12 - Exploit Demo 2
Lecture 13 - Advanced Binary Analysis
Assignments
Assignment 1
Assignment 2
Assignment 3
Extra
Assembly Language
Processes. Dynamic Analysis. GDB
The GNU Debugger (GDB)
Debugging with IDA
Executables. Static Analysis
Web Application Security (part 1)
Web Application Security (part 2)
Table of Contents
Lecture 09 - Code Reuse (part 2)
Demo
cns/lectures/lecture-09.txt ยท Last modified: 2019/12/07 14:08 by razvan.deaconescu
Old revisions
Media Manager
Back to top