Questions about this topic? Sign up to ask in the talk tab.

Difference between revisions of "User:Hatter/fast tracks"

From NetSec
Jump to: navigation, search
(Binary Exploitation)
Line 17: Line 17:
  
 
== Binary [[Exploitation]] ==  
 
== Binary [[Exploitation]] ==  
# [[C]]
 
# [[Buffer overflow]]
 
 
# [[Bitwise math]]
 
# [[Bitwise math]]
# [[Assembly]]
+
# [[Assembly]] and [[C]]
 
# [[Linux assembly]]
 
# [[Linux assembly]]
 +
# [[Buffer overflow]]
 
# [[shellcode]]
 
# [[shellcode]]
# [[return oriented programming]]
 
 
# [[Shellcode/Loaders]]
 
# [[Shellcode/Loaders]]
# [[null-free shellcode]]
 
 
# [[Shellcode/Environment]]
 
# [[Shellcode/Environment]]
 +
# [[Shellcode/Null-free]]
 
# [[Shellcode/Self-modifying]]
 
# [[Shellcode/Self-modifying]]
 
# [[ascii shellcode]]
 
# [[ascii shellcode]]
Line 33: Line 31:
 
# [[Shellcode/Parsing]]
 
# [[Shellcode/Parsing]]
 
# [[Shellcode/Dynamic]]
 
# [[Shellcode/Dynamic]]
 +
# [[return oriented programming]]

Revision as of 04:00, 25 May 2013

Web Exploitation

  1. HTTP
  2. XSS
  3. CSRF
  4. Cookies
  5. MySQL
  6. SQL orientation
  7. SQL injection
  8. blind sql injection
  9. comparative precomputation
  10. PHP
  11. Coldfusion hacking
  12. File inclusion
  13. unsafe string replacement
  14. command Injection
  15. XSCF

Binary Exploitation

  1. Bitwise math
  2. Assembly and C
  3. Linux assembly
  4. Buffer overflow
  5. shellcode
  6. Shellcode/Loaders
  7. Shellcode/Environment
  8. Shellcode/Null-free
  9. Shellcode/Self-modifying
  10. ascii shellcode
  11. alphanumeric shellcode
  12. Shellcode/Socket-reuse
  13. Shellcode/Parsing
  14. Shellcode/Dynamic
  15. return oriented programming