All posts by Loudagonda

Windows Exploitation Course: Stack and Heap Overflows

This course gives intrinsic details of exploiting stack and heap overflows in Windows software applications. It walks the students through all the steps that are necessary for bug hunting from reverse engineering to fuzzing to actually writing exploits in Windows software applications. It also teaches how a student should actually go about exploiting these vulnerabilities and bypassing the various Windows protection mechanisms. Overall, this is a course worth the money. It is one of the best tutorial for beginners as well as people who are inclined to understand the inner details of Windows protection mechanisms and bypass them.

This book focuses on teaching people in bypassing modern controls in Windows 7 especially focusing on exploits that can bypass ASLR, hardware DEP, software DEP, etc. Also focuses on teaching  JavaScript vector array technique to bypass ASLR and exploit pointer manipulation.

windows2

Buy it at Amazon

Windows Stack Exploitation

This book gives intrinsic details of exploiting stack overflows in Windows applications. It walks the reader through various steps that are necessary for identifying stack overflow vulnerabilities in Windows applications. It also teaches how a reader should actually go about exploiting these vulnerabilities and bypass various Windows protections. Overall, this is a great tutorial for beginners as well as people who are inclined to understand the inner details of Windows protection mechanisms and bypass.

windows1

Buy it at Amazon

Embedded Device Security Course: Pwn Linux Operating System Devices

This course is an introduction for the reader into the wonderful world of embedded device exploitation.The course is supposed to be a tutorial guide that helps a reader understand the various skills required for hacking an embedded device. As the world is getting more and more into the phenomenon of “Internet of Things”, such skill sets can be useful to hack from a simple intelligent light bulb to hacking into a car.

This course book goes into details of exploiting MIPS and ARM based devices. Also it focuses on teaching how to bypass DEP and ASLR protection in embedded devices.

embedded4

Buy it at Amazon