HITBSecConf2006 Presentation - Finding Secrets in ISAPI.
bc0314b2e692a9f545d86a278fbf1b1fff9a3394cf2ad0abb846888a1a402087
Source code for all the examples used in tutorials 1 through 4 of 'Writing Stack Based Overflows On Windows'.
860b53e6a362f1432b875fd79227494b5d512c72cfa9e23132fc2648cd5ae25e
Writing Stack Based Overflows on Windows - Part IV: Shellcode creation and exploitation an application remotely.
8574a8998f8d62e5c51157c0cfca653779fe111f04fd2362565eb53dd4584fb2
Writing Stack Based Overflows on Windows - Part III: Walking through a stack based overflow and writing an exploit for a local overflow.
f90a0115f7445c95c71fa6878bcc43ebb6802fec3409da9bbdfa11726c784353
Writing Stack Based Overflows on Windows - Part II: Windows Assembly for writing Exploits
458ebf2f8f50c0249db41a0f2babf0e9c981f7c972089ff9b19153fd0210a5ff
Writing Stack Based Overflows on Windows - Part I: Basic Concepts
f2eded9aca3088ea4d10a3faf846a8d5c7b7d77f76c4957ad9691750d63e1c75
Analyzing Code for Security Defects - Reviewing code to find vulnerabilities is becoming more and more common. Reviewing code is not only useful from a developers point of view but also from an attacker's point of view. The talk covers the basics of threat analysis, how to assess threats and what are some of the vulnerabilities that could exists in code when performing code reviews for large code bases.
577816544352b93086ef9e99da313f9fee376f881ae388b2695b3cf5b1bae2f1