This is an embedded Microsoft Office presentation, powered by Office Online. During the session, I will be demonstrating how a buffer overflow vulnerability is identified and exploited. You will need the following tools: Python, Immunity Debugger, Mona Modules and Vulnserver. The tutorial is broken down into the following: Setting up the Lab.Fuzzing (Sending bytes in … Continue reading Buffer Overflow, 32-bit example.
Title: Anti-Virus Evasion Techniques Location: Teesside University Event: Cyberfest Date: 13.09.18 This is an embedded Microsoft Office presentation, powered by Office Online.
Net Ethical Hacking & Hardware - Exploitation Techniques - Vulnerabilities Exploits & Payloads. Location: Teesside University
Title: Northumbria University - CyberClinic - WPA Cracking & Hashcat Date: 14.11.2018
So we have learned how to navigate a terminal and manipulate the files and folders within the terminal itself. Now the question is, how to we find files, and programs. Well funnily enough Debian comes packaged with some great commands for this, mainly: Locate (Finds files and directories) Which (Finds paths for specific programs) Find (Finds files … Continue reading Let’s learn Linux Commands (Part 3 – Finding Files on Kali)
So now we have learned how to move around the terminal in the previous post. Let's move onto manipulating files and folders. We will focus on the following commands, which I believe are the ones you will use the most on your hacking adventures. mkdir (Make Directory) touch (Create a file) mv (Move a File/Folder) … Continue reading Let’s learn Linux Commands (Part 2 – File/Folder Manipulation)
Now that we have the hacking lab setup. Let's move onto something a much more interesting, the linux command line. If you have never touched a linux machine before, that's fine. This post is primarily going to focus on commands that are absolutely vital to navigating a terminal. Let's start... PWD (Print Working Directory) The … Continue reading Let’s learn Linux Commands (Part 1 – Terminal Navigation)
Creating the NAT Network in Virtualbox In this post we will configure the network so that Kali and Metasploitable-2 are on an isolated NAT Network. The first thing we need to do is create the NAT in Virtualbox. Open Virtualbox. Click File. Click Preferences. On the left hand side, click on NETWORK. Click on the … Continue reading Setting up the Hacking Lab (Part 3 – Network Configuration)
In this post we are going to install the Metasploit 2 linux distribution. If you are thinking "What the hell is Metasploitable", i'm here to answer your question. Essentially Metasploitable is a purposely vulnerable machine. It's used to practice exploitation techniques, it's also perfect for new starters. While we will not be jumping into exploiting … Continue reading Setting up the Hacking Lab (Part 2 – Installing Metasploitable-2)
I have created a series of videos for the people who prefer to follow along with them instead. They are available on the Youtube Channel if you prefer to just follow along with the playlist. Installing VirtualBox https://www.youtube.com/watch?v=JvjPmiawejU&index=1&list=PLZJHsegNrQn9FutEv1fSm4CUOmmX8eqKK Importing VBOX Image into Virtualbox https://www.youtube.com/watch?v=pIgGlYgmvsc&t=4s Launching Virtualbox Image https://www.youtube.com/watch?v=TE0o44k3ZUs