Binary Exploits with Python

Binary Exploits with Python

English | MP4 | AVC 1920×1080 | AAC 48KHz 2ch | 2h 53m | 651 MB

Create simple binary exploits with Python

A penetration tester who only knows how to use tools written by others is limited to old techniques. Learning to develop your own exploits will make you much more powerful. Python is the favorite choice for penetration testers because it combines simplicity and ease of use with advanced features.

This video course starts with high-level code injection, the simplest sort of exploit. It then explains binary exploits that allow you to skip past unwanted code, such as the password or product key tests, and add Trojan code. You will perform the exploit development process: finding a vulnerability, analyzing a crash in a debugger, creating a crafted attack, and achieving remote code execution on Windows and Linux. You will use the gdb debugger to analyze Linux executables and Python code to exploit them. On Windows, you’ll use the Immunity debugger and Python.

This course uses a demonstration-and-challenge approach which guides students from passive observation to practical implementation of binary exploit at development techniques.

What You Will Learn

  • Remove unwanted code such as the password or product key tests, and add Trojan code
  • Analyze simple Windows executable files and modify them using the Immunity Debugger
  • Write Python Scripts to perform exploits
  • Analyze simple Linux executable files and modify them using the gdb debugger
Table of Contents

Modifying Windows Programs
The Course Overview
EXE Hacking with OllyDbg
Creating Malware with Metasploit
Adding Trojans to EXE Files
Introductory Assembly Language
Challenge 1: Patching an EXE
Challenge 2: Patching 19 and 256 EXEs
Challenge 3: Assembly Language Programming

Command Injection
Ping Form (with Challenge)
String Overflow (with Challenge)
ImageMagick (with Challenge)
SQL Injection
SQL Injection Challenges

Exploiting Linux Vulnerabilities
Redirecting Execution
Using Shellcode
Using Msfvenom
Format String Vulnerability
Heap Overflow
Challenges

Exploiting Windows Vulnerabilities
Stack Buffer Overflow
Defeating Address Space Layout Randomization
Defeating Data Execution Prevention
Heap Spray
Exploiting the SEH
Fuzzing with SPIKE
Challenges: KSTET and GMON