Recent changes
Login
This is an old revision of the document!
Documentation
Use cs.curs.pub.ro account to access documentation:
https://elf.cs.pub.ro/oss/res/doc/
.
Bibliography
Robert Seacord - Secure Coding in C and C++, Addison Wesley Professional, 2005
Robert Seacord - The CERT C Secure Coding Standard, Addison Wesley Professional, 2008
Anton Chuvakin, Cyrus Peikari - Security Warrior, O'Reilly, 2004
Grey Hat Hacking. The Ethical Hacker's Handbook, 3rd Edition, McGraw Hill, 2011
Enrico Perla, Massimiliano Oldani - A Guide to Kernel Exploitation, Syngress, 2011
Jon Erickson - The Art of Exploitation, 2nd Edition, No Starch, 2008
Michael A. Davis, Sean M. Bodmer, Aaron LeMasters - Hacking Exposed. Malware and Rootkits, McGraw Hill, 2010
Bruce Schneier - Applied Cryptography, John Wiley & Sons, 1996
Calendar
Class Register
Lab Split
CNS Need to Know
News
Rules and Grading
Resources
Direct Access
Documentation
RSS Feed
Mailing List
The CNS Public Repository
Microsoft Teams
Virtual Machines
What to do after CNS
Labs
Lab 01 - Introduction. Basic Exploration Tools
Lab 02 - Program Analysis
Lab 03 - The Stack. Buffer Management
Lab 04 - Exploiting. Shellcodes
Lab 05 - Exploiting. Shellcodes (Part 2)
Lab 06 - Exploit Protection Mechanisms
Lab 07 - Strings
Lab 08 - Return-Oriented Programming
Lab 09 - Return-Oriented Programming (Part 2)
Lab 10 - Use After Free
Lab 11 - CTF Challenges (part 1)
Lab 12 - CTF Challenges (part 2)
Extra - Integers
Extra - Advanced Binary Analysis
Lectures
Lecture 01 - Introduction. Basic Exploration Tools
Lecture 02 - Program Analysis
Lecture 03 - The Stack. Buffer Management
Lecture 04 - Exploiting. Shellcodes
Lecture 05 - Exploiting. Shellcodes (part 2)
Lecture 06 - Exploit Protection Mechanisms
Lecture 07 - Strings. Information Leaks
Lecture 08 - Code Reuse (part 1)
Lecture 09 - Code Reuse (part 2)
Lecture 10 - Heap Exploitation
Lecture 11 - Exploit Demo 1
Lecture 12 - Exploit Demo 2
Lecture 13 - Advanced Binary Analysis
Assignments
Assignment 1
Assignment 2
Assignment 3
Extra
Assembly Language
Processes. Dynamic Analysis. GDB
The GNU Debugger (GDB)
Debugging with IDA
Executables. Static Analysis
Web Application Security (part 1)
Web Application Security (part 2)
Table of Contents
Documentation
Bibliography
cns/resources/documentation.1381139358.txt.gz ยท Last modified: 2015/10/07 16:39 (external edit)
Old revisions
Media Manager
Back to top