Questions about this topic? Sign up to ask in the talk tab.
Difference between revisions of "User:Hatter/fast tracks"
From NetSec
(→Binary Exploitation) |
|||
| Line 17: | Line 17: | ||
== Binary [[Exploitation]] == | == Binary [[Exploitation]] == | ||
| − | |||
| − | |||
# [[Bitwise math]] | # [[Bitwise math]] | ||
| − | # [[Assembly]] | + | # [[Assembly]] and [[C]] |
# [[Linux assembly]] | # [[Linux assembly]] | ||
| + | # [[Buffer overflow]] | ||
# [[shellcode]] | # [[shellcode]] | ||
| − | |||
# [[Shellcode/Loaders]] | # [[Shellcode/Loaders]] | ||
| − | |||
# [[Shellcode/Environment]] | # [[Shellcode/Environment]] | ||
| + | # [[Shellcode/Null-free]] | ||
# [[Shellcode/Self-modifying]] | # [[Shellcode/Self-modifying]] | ||
# [[ascii shellcode]] | # [[ascii shellcode]] | ||
| Line 33: | Line 31: | ||
# [[Shellcode/Parsing]] | # [[Shellcode/Parsing]] | ||
# [[Shellcode/Dynamic]] | # [[Shellcode/Dynamic]] | ||
| + | # [[return oriented programming]] | ||
Revision as of 03:00, 25 May 2013
Web Exploitation
- HTTP
- XSS
- CSRF
- Cookies
- MySQL
- SQL orientation
- SQL injection
- blind sql injection
- comparative precomputation
- PHP
- Coldfusion hacking
- File inclusion
- unsafe string replacement
- command Injection
- XSCF