Главная
Study mode:
on
1
Introduction
2
Patricia Aas
3
The Weird Machine
4
The Weird State
5
The Mental Model
6
Exploit Development
7
Target Program
8
Program
9
CWE
10
Use of inherently dangerous function
11
Happy day scenario
12
Unhappy day scenario
13
Global Thermonuclear War
14
Stack Canary
15
Debug Build
16
Prefer C
17
Debug
18
Stack variables
19
Short string
20
Control
21
Automate
22
Fixing C
23
Stack Buffer Overflow
24
SLR Address Layout
25
Pattern Offset
26
Shellcode
27
Exploit Framework II
28
Code Size
29
STrace
30
Shell Code
31
Shut Sea
32
Inline Assembly
33
Calling Convention
34
Character Buffers
35
Shell
36
Pipe
37
Cheating
38
Weird States
39
deterministically correct
Description:
Explore the intricacies of exploit development in this ACCU 2019 conference talk by Patricia Aas. Dive into the world of security vulnerabilities and secure coding from an attacker's perspective, focusing on C and x86_64 assembly. Learn about the "Weird Machine" concept, exploit development techniques, and the importance of understanding potential security risks in programming. Examine a simple exploit step-by-step, including target program analysis, stack buffer overflows, and shellcode creation. Gain insights into debugging techniques, stack canaries, and address layout randomization. Discover how to approach exploitation as a programming tool and develop a deeper understanding of secure coding practices. This talk is ideal for programmers looking to enhance their knowledge of cybersecurity and defensive programming strategies.

The Anatomy of an Exploit

ACCU Conference
Add to list
0:00 / 0:00