网盘:百度 | 学分:5,VIP免费 | 发布:2024-12-01 | 查看:0 | 更新:2024-12-01 | 测试/产品/安全

二进制安全系列教程

课程介绍

二进制安全系列教程一套面的资源涵盖有关二进制安全基础知识高级主题。它旨在帮助开发人员安全研究人员了解如何保护软件免受二进制漏洞和攻击的侵害。

目标受众

教程系列适用于:

先决条件

教程优势

课程目录

/14-135-二进制安全系列教程/
│├─0x01 经典栈溢出(上)
│├─0x02 经典栈溢出(下)
│├─0x03 经典栈溢出实例之EasyRM2mp3
│├─0x04 经典栈溢出实例之DNSTracer
│├─0x05 探索stack cookie
│├─0x06 另辟蹊径之覆盖SEH
│├─0x07 一次失败的栈溢出(SEH)之GetGo DownloAD Manager
│├─0x08 DEP与ASLR简述
│├─0x09 linux环境下的ROP(上)
│├─0x0A linux环境下的ROP(下)
│├─0x0B linux下ROP练习之r0PBaby[CTF-2015-defcon]
│├─0x0C Windows环境下的ROP(上)
│├─0x0D Windows环境下的ROP(下)
│├─0x0E 探索上古Windows用户
│├─0x0F 【特别篇】Windows上古-近代堆详述
│├─0x10 近代Windows用户堆的利用基础
│├─0x11 【特别篇】深入理解LFH
│├─0x12 浅析linux内存管理
│├─slides
│├─二进制安全(国外)

详细目录

0x01 经典栈溢出(上)/
│├─经典栈溢出(上).mp4 158.3MB
0x02 经典栈溢出(下)/
│├─经典栈溢出(下).mp4 123.8MB
0x03 经典栈溢出实例之EasyRM2mp3/
│├─经典栈溢出实例之EasyRM2mp3.mp4 190.3MB
0x04 经典栈溢出实例之DNSTracer/
│├─经典栈溢出实例之DNSTracer.mp4 181.3MB
0x05 探索stack cookie/
│├─探索stack cookie.mp4 78.6MB
0x06 另辟蹊径之覆盖SEH/
│├─另辟蹊径之覆盖SEH.mp4 118.1MB
0x07 一次失败的栈溢出(SEH)之GetGo DownloAD Manager/
│├─一次失败的栈溢出(SEH)之GetGo DownloAD Manager.mp4 75.9MB
0x08 DEP与ASLR简述/
│├─DEP与ASLR简述.mp4 86MB
0x09 linux环境下的ROP(上)/
│├─linux环境下的ROP(上).mp4 144.6MB
0x0A linux环境下的ROP(下)/
│├─linux环境下的ROP(下).mp4 144MB
0x0B linux下ROP练习之r0PBaby[CTF-2015-defcon]/
│├─linux下ROP练习之r0PBaby[CTF-2015-defcon].mp4 109.2MB
0x0C Windows环境下的ROP(上)/
│├─Windows环境下的ROP(上).mp4 169.4MB
0x0D Windows环境下的ROP(下)/
│├─Windows环境下的ROP(下).mp4 151.4MB
0x0E 探索上古Windows用户堆/
│├─探索上古Windows用户堆.mp4 191.8MB
0x0F 【特别篇】Windows上古-近代堆详述/
│├─【特别篇】Windows上古-近代堆详述.mp4 210.6MB
0x10 近代Windows用户堆的利用基础/
│├─近代Windows用户堆的利用基础.mp4 210.3MB
0x11 【特别篇】深入理解LFH/
│├─【特别篇】深入理解LFH.mp4 230.6MB
0x12 浅析linux内存管理/
│├─浅析linux内存管理.mp4 194.2MB
slides/
│├─DEP &AMp; ASLR简述.PPTx 1.8MB
│├─linux环境下的ROP.PPTx 2.8MB
│├─Windows环境下的ROP.PPTx 1.1MB
│├─另辟蹊径之覆盖SEH.PPTx 1MB
│├─探索Stack Cookie.PPTx 996.2kB
│├─探索上古Windows用户堆.PPTx 997.8KB
│├─浅析linux内存管理.PPTx 1.6MB
│├─经典栈溢出.PPTx 1.6MB
│├─近代Windows用户堆的利用基础.PPTx 1MB
二进制安全(国外)/
│├─binary_Hacking_Course
binary_Hacking_Course/
││├─A sIMple Format String exploit exAMple – bin 0x11-0WvrSfcdq1I.mkv 45.4MB
││├─ADapting the 32bit exploit to 64bit for format4 – bin 0x27-_lO_rwaK_pY.mkv 25.5MB
││├─Bruteforce 32bit Stack Cookie. stack0 – part 3 – bin 0x23-KGzHcqJV-QM.mkv 52.3MB
││├─Buffer Overflows can Redirect ProgrAM Execution – bin 0x0D-8QzOC8HfOqU.mkv 25.5MB
││├─Developing an intuition for binary exploitation – bin 0x20-akCce7vSSfw.mkv 22.6MB
││├─Doing ret2libc with a Buffer Overflow because of restricted return POInter – bin 0x0F-m17mV24TgwY.mkv 101.5MB
││├─ExplAIning Dirty COW local root exploit – CVE-2016-5195-kEsshExn7aE.mkv 46.1MB
││├─First Exploit! Buffer Overflow with Shellcode – bin 0x0E-HSlhY4Uy8SA.mkv 49.5MB
││├─First Stack Buffer Overflow to modify Variable – bin 0x0C-T03idxny9jE.mkv 37MB
││├─First rEMOte root exploit – bin 0x1D-HAN8Qun26cQ.mkv 32.9MB
││├─Format String Exploit and overwrite the Global Offset Table – bin 0x13-t1LH9D5cuK4.mkv 39.6MB
││├─Global Offset Table (GoT) and Procedure Linkage Table (PLT) – bin 0x12-kUk5pw4w0h4.mkv 68.5MB
││├─How a CPU works and Introduction to Assembler – bin 0x04-6jSKldt7Eqs.mkv 72.9MB
││├─Introduction to linuxINStallation and the Terminal – bin 0x01-navuBR4aJSs.mkv 46.2MB
││├─linux signals and core dumPSbin 0x1C-_shKdU7mGxs.mkv 42.4MB
││├─LiveOverflow Channel Introduction and Backstory – bin 0x00-iyAyN3GFM7A.mkv 27.5MB
││├─Playing around with a Format String vulnerability and ASLR. format0 – bin 0x24-CyazDp-Kkr0.mkv 86.8MB
││├─REMOte format string exploit in syslog() – bin 0x1E-MBz5C9Wa6KM.mkv 75.3MB
││├─Reverse engineering C ProgrAMs – bin 0x10-vXWHmucgZW0.mkv 53.6MB
││├─Reversing and Cracking first sIMple ProgrAMbin 0x05-VroEIMOJPm8.mkv 98.6MB
││├─SIMple Tools and Techniques for Reversing a binary – bin 0x06-3NTXFUxcKPc.mkv 61.9MB
││├─smashing the Stack for Fun and Profit – setuid, ssh and exploit.education – bin 0x0B-Y-4wHf0of6Y.mkv 44.4MB
││├─Socket ProgrAMming in python and Integer Overflow – bin 0x1B-d6BU8DWxb3c.mp4 47.5MB
││├─Stack grooming and 100% reliable exploit for format0 – bin 0x25-AahpiYxKR2c.mkv 26.1MB
││├─Syscalls, Kernel vs. User Mode and linux Kernel Source Code – bin 0x09-fLS99zJDHOc.mkv 63.8MB
││├─TCP Protocol introduction – bin 0x1A-0EHo0HsTKJw.mkv 71.8MB
││├─The Heap – How do use-after-free exploits work – bin 0x16-ZHghwsTRyzQ.mp4 48.6MB
││├─The Heap – How to exploit a Heap Overflow – bin 0x15-TfJrU95q1J4.mp4 75.5MB
││├─The Heap – Once upon a free() – bin 0x17-gL45bjQvZSU.mp4 96.5MB
││├─The Heap – dlmalloc unlink() exploit – bin 0x18-HWhzH–89UQ.mkv 35.6MB
││├─The Heap – what does malloc() do – bin 0x14-HPDBOhiKAD8.mkv 31.4MB
││├─The deal with numbers – hexADecIMal, binary and decIMals – bin 0x0A-mT1V7IL2FHY.mkv 32.4MB
││├─Uncrackable ProgrAM Finding a Parser Differential in loADing ELF – Part 2_2 – bin 0x08-OZvc-c1OLnM.mkv 34.9MB
││├─Uncrackable ProgrAMs Key validation with AlGorithm and creating a Keygen – Part 1_2 – bin 0x07-qS4VWL5R_OM.mkv 37.8MB
││├─Writing a sIMple ProgrAM in C – bin 0x02-JGoUaCmMNpE.mkv 34.1MB
││├─Writing a sIMple ProgrAM in pythonbin 0x03-ajy1PHWYeyQ.mkv 37.7MB



*声明:课程资源购自网络,版权归原作者所有,仅供参考学习使用,严禁外传及商用,若侵犯到您的权益请联系客服删除。

下载地址(复制到浏览器打开,手机端请扫码下载):

请登录购买后查看,VIP全站免费下载

充值 升级VIP
收藏(0

万部精品课程任意搜

热门TAG: 14148期 五运 软广 无镜 张士 正玄 14592期 14251期 方俊人 好的
微信客服 搜索课程 返回顶部