The fascinating interplay of CPU, stack, C-compiler and shellcode in a nutshell Everything started with Aleph One’s paper “Smashing the Stack for Fun and Profit”. These techniques are still the basis for modern exploitation of buffer, heap and format string vulnerabilities. We will give a swift overview about C functions, stack usage, assembler, gcc, gdb Read More …
Category: Hacker TV
Hacker Videos
Hacker TV – Hacker Course Buffer Overflow
A first step to become a true Hacker.
Hacker TV – Kerberoasting & Attacks 101
Want to understand how Kerberos works? Would you like to understand modern Kerberos attacks? Tim Medin walks you through how to attack Kerberos with ticket attacks and Kerberoasting. He covers the basics of Kerberos authentication and then shows you how the trust model can be exploited for persistence, pivoting, and privilege escalation. At the conclusion, Read More …
Malware TV – Reverse Engineering
CTF Field Guide Alex Sotirov, Reverse Engineering 1, Fall 2011
Moran Cerf – Moth GrandSLAM winning story
Moran Cerf – Moth GrandSLAM winning story
Malware TV – Automatically Extracting Obfuscated Strings from Malware
The FireEye Labs Obfuscated String Solver (FLOSS) is an open-source tool that automatically detects, extracts, and decodes obfuscated strings in Windows Portable Executable (PE) files. Malware analysts, forensic investigators, and incident responders can use FLOSS to quickly extract sensitive strings to identify indicators of compromise (IOCs). Malware authors encode strings in their programs to hide Read More …
Hacker TV – What Is An XXE Attack?
XML files can incorporate inline references to other documents. Unsafe treatment of external references allows an attacker to probe your file system for sensitive information – an XML External Entity (XXE) attack.
Conference Video – Dirty Red Team tricks
Let’s time travel to 2003 with today’s tools and own everything. This talk takes you inside the red teams at the North East and Mid Atlantic Collegiate Cyber Defense competition events. Raphael Mudge, the developer of the Armitage Metasploit GUI, will guide you on this journey. You will learn how to automate Metasploit, nmap, and Read More …