This is an embedded Microsoft Office presentation, powered by Office Online. During the session, I will be demonstrating how a buffer overflow vulnerability is identified and exploited. You will need the following tools: Python, Immunity Debugger, Mona Modules and Vulnserver. The tutorial is broken down into the following: Setting up the Lab.Fuzzing (Sending bytes in … Continue reading Buffer Overflow, 32-bit example.
Title: Anti-Virus Evasion Techniques Location: Teesside University Event: Cyberfest Date: 13.09.18 This is an embedded Microsoft Office presentation, powered by Office Online.
Net Ethical Hacking & Hardware - Exploitation Techniques - Vulnerabilities Exploits & Payloads. Location: Teesside University
Title: Northumbria University - CyberClinic - WPA Cracking & Hashcat Date: 14.11.2018
So we have learned how to navigate a terminal and manipulate the files and folders within the terminal itself. Now the question is, how to we find files, and programs. Well funnily enough Debian comes packaged with some great commands for this, mainly: Locate (Finds files and directories) Which (Finds paths for specific programs) Find (Finds files … Continue reading Let’s learn Linux Commands (Part 3 – Finding Files on Kali)
So now we have learned how to move around the terminal in the previous post. Let's move onto manipulating files and folders. We will focus on the following commands, which I believe are the ones you will use the most on your hacking adventures. mkdir (Make Directory) touch (Create a file) mv (Move a File/Folder) … Continue reading Let’s learn Linux Commands (Part 2 – File/Folder Manipulation)
Now that we have the hacking lab setup. Let's move onto something a much more interesting, the linux command line. If you have never touched a linux machine before, that's fine. This post is primarily going to focus on commands that are absolutely vital to navigating a terminal. Let's start... PWD (Print Working Directory) The … Continue reading Let’s learn Linux Commands (Part 1 – Terminal Navigation)