mona.py – the manual <- Higthly recommended tool
First: Exploit Writing Tutorials by corelanc0d3r.
- Exploit writing tutorial part 1 : Stack Based Overflows
- Exploit writing tutorial part 2 : Stack Based Overflows – jumping to shellcode
- Exploit writing tutorial part 3 : SEH Based Exploits
- Exploit writing tutorial part 3b : SEH Based Exploits – just another example
- Exploit writing tutorial part 4 : From Exploit to Metasploit – The basics
- Exploit writing tutorial part 5 : How debugger modules & plugins can speed up basic exploit development
- Exploit writing tutorial part 6 : Bypassing Stack Cookies, SafeSeh, SEHOP, HW DEP and ASLR
- Exploit writing tutorial part 7 : Unicode – from 0×00410041 to calc
- Exploit writing tutorial part 8 : Win32 Egg Hunting
- Exploit writing tutorial part 9 : Introduction to Win32 shellcoding
- Exploit writing tutorial part 10 : Chaining DEP with ROP – the Rubik’s[TM] Cube
- Starting to write Immunity Debugger PyCommands : my cheatsheet
Second: SecurityTube Exploit Research megaprimer.
- Exploit Research Megaprimer Part 1 Topic Introduction By Vivek
- Exploit Research Megaprimer Part 2 Memcpy Buffer Overflow
- Exploit Research Megaprimer Part 3 Strcpy Buffer Overflow
- Exploit Research Megaprimer Part 4 Minishare Buffer Overflow
- Exploit Research Megaprimer Part 5 Freesshd Buffer Overflow
- Exploit Research Megaprimer Part 6 Seh Basics
- Exploit Research Megaprimer Part 7 Overwrite Seh
- Exploit Research Megaprimer Part 8 Exploiting Seh
- Exploit Research Megaprimer Part 9 Guest Lecture By Andrew King
- Binary Diffing Microsoft Patches
Third: Heap Overflow: For Humans + Vulnerability and Heap Internals Explained
Fourth: ARM exploitation
Fifth: Many interesting videos related with exploit development
Soon this post will be updated.
No hay comentarios:
Publicar un comentario