Violent Python and Exploit DevelopmentWorking Connections IllinoisSam BowneSchedule · Powerpoints · Projects · Links · Home Page
|
Class DescriptionEven if you have never programmed before, you can quickly and easily learn how to make custom hacking tools in Python. In hands-on projects, participants will create tools and hack into test systems, including:
In the exploit development section, students will take over vulnerable systems with simple Python scripts. Hands-on projects will include:
Technical RequirementsParticipants need a computer (Windows, Mac, or Linux) with VMware Player or VMware Fusion. USB thumbdrives will be available with Kali Linux and Windows Server 2008 virtual machines to use.All the class materials are freely available on my Web page (samsclass.info) for anyone to use. Prerequisite KnowledgeParticipants should be familiar with networking and security concepts at the Network+ and Security+ level. Previous programming experience is helpful but not necessary.Learning OutcomesUpon successful completion of this course, the student will be able to:
TextbooksViolent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers by TJ O'Connor -- ISBN-10: 1597499579 (2012) Buy from Amazon
The Shellcoder's Handbook: Discovering and Exploiting Security Holes, by Chris Anley, John Heasman, Felix Lindner, Gerardo Richarte; ASIN: B004P5O38Q
Buy from Amazon |
Schedule | ||||
---|---|---|---|---|
Mon May 18, 1:00 - 6:00 pm | Violent Python | |||
Tue May 19, 8:30 am - 5:00 pm | Exploit Development on Linux: Stack overflows and shellcode | |||
Wed May 20, 8:30 am - 5:00 pm | Exploit Development on Windows: Stack overflows and shellcode | |||
Thu May 21, 8:30 am - 5:00 pm | Exploit Development on Windows: Dangling Pointers and Defeating Windows Defenses | |||
Fri May 22, 8:30 am - 12:00 pm | Special Topics TBA |
Lectures (In Development)Violent PythonViolent Python: Introduction and Motivation (ppt)Demo: Banner-grabbing -- students do Projects 2 & 3 Demo: HTTP requests -- students do Projects 4 & 5 & 2x Demo: Password hashes -- students do Projects 6 & 7 Demo: Antivirus evasion -- students do Projects 8 - 10 Exploit DevelopmentIntroduction to exploitsStack overflows on Linux Shellcode on Linux Windows shellcode Stack overflows on Windows Defeating Windows defense mechanisms
The lectures are in Word and PowerPoint formats. |