Dreamhack - System Hacking

1.[Dreamhack] Background: Linux Memory Layout

post-thumbnail

2.[Dreamhack] Quiz: Linux Memory Layout

post-thumbnail

3.[Dreamhack] Background: Computer Architecture

post-thumbnail

4.[Dreamhack] Quiz: Computer Architecture

post-thumbnail

5.[Dreamhack] x86 Assembly: Essential Part(1)

post-thumbnail

6.[Dreamhack] Quiz: x86 Assembly 1

post-thumbnail

7.[Dreamhack] x86 Assembly: Essential Part(2)

post-thumbnail

8.[Dreamhack] Quiz: x86 Assembly 2

post-thumbnail

9.[Dreamhack] Tool: pwntools

post-thumbnail

10.[Dreamhack] Exploit Tech: Shellcode

post-thumbnail

11.[Dreamhack] Background: Calling Convention

post-thumbnail

12.[Dreamhack] Quiz: Calling Convention

post-thumbnail

13.[Dreamhack] Memory Corruption: Stack Buffer Overflow

post-thumbnail

14.[Dreamhack] Exploit Tech: Return Address Overwrite

post-thumbnail

15.[Dreamhack] Mitigation: Stack Canary

post-thumbnail

16.[Dreamhack] Exploit Tech: Return to Shellcode

post-thumbnail

17.[Dreamhack] Mitigation: NX & ASLR

post-thumbnail

18.[Dreamhack] Background: Library - Static Link vs. Dynamic Link

post-thumbnail

19.[Dreamhack] Quiz: Static Link vs. Dynamic Link

post-thumbnail

20.[Dreamhack] Exploit Tech: Return to Library

post-thumbnail

21.[Dreamhack] Exploit Tech: Return Oriented Programming

post-thumbnail

22.[Dreamhack] Background: RELRO

post-thumbnail

23.[Dreamhack] Quiz: RELRO

post-thumbnail

24.[Dreamhack] Background: PIE

post-thumbnail

25.[Dreamhack] Exploit Tech: Hook Overwrite

post-thumbnail

26.[Dreamhack] Memory Corruption: Out of Bounds

post-thumbnail

27.[Dreamhack] Quiz: Out of Bounds

post-thumbnail

28.[Dreamhack] Memory Corruption: Format String Bug

post-thumbnail

29.Exploit Tech: Format String Bug

post-thumbnail

30.[Dreamhack] Memory Corruption: Use After Free

post-thumbnail

31.[Dreamhack] Exploit Tech: Use After Free

post-thumbnail

32.[Dreamhack] Background:ptmalloc2

post-thumbnail

33.[Dreamhack] Memory Corruption: Double Free Bug

post-thumbnail

34.[Dreamhack] Exploit Tech: Tcache Poisoning

post-thumbnail

35.[Dreamhack] Logical Bug: Type Error

post-thumbnail

36.[Dreamhack] Logical Bug: Command Injection

post-thumbnail

37.[Dreamhack] Logical Bug: Path Traversal

post-thumbnail

38.[Dreamhack] Background: SECCOMP

post-thumbnail

39. [Dreamhack] Exploit Tech: Bypass SECCOMP

post-thumbnail

40.[Dreamhack] Background: Master Canary

post-thumbnail

41.[Dreamhack] Exploit Tech: Master Canary

post-thumbnail

42.[Dreamhack] Background: _rtld_global

post-thumbnail

43.[Dreamhack] Exploit Tech: overwrite _rtld_global

post-thumbnail

44.[Dreamhack] Exploit Tech: __environ

post-thumbnail

45.[Dreamhack] Background: SigReturn-Oriented Programming

post-thumbnail

46.[Dreamhack] Exploit Tech: SigReturn-Oriented Programming

post-thumbnail

47.[Dreamhack] Exploit Tech: _IO_FILE Arbitrary Address Read

post-thumbnail

48.[Dreamhack] Exploit Tech: _IO_FILE Arbitrary Address Write

post-thumbnail

49.[Dreamhack] Exploit Tech: Bypass IO_validate_vtable

post-thumbnail