x33fcon course – From zero to first 0-day (2020) - Full Course
by Khoromnikov - Friday June 7, 2024 at 12:00 PM
#31
thanks for sharing
Reply
#32
it looks like amazing course
Reply
#33
i miss you gang
Reply
#34
thanks for the zero day course
Reply
#35
Thanks for this !!
Reply
#36
thank you for that!!!
Reply
#37
hmm looks interesting
Reply
#38
Replying to see the content!
Reply
#39
thanks for sharing
Reply
#40
(Jun 07, 2024, 12:00 PM)Khoromnikov Wrote:
x33fcon course – From zero to first 0-day (2020)
The workshop is designed to introduce participants to the arcana of the best methods and tools for automatic detection of vulnerabilities and bug analysis in software in a practical way.
In the beginning, we will focus on understanding techniques: binary analysis, searching for various types of vulnerabilities and debugging. We "bite" into practical fuzzing and mistakes that keep programmers awake at night using their non-deterministic occurrence. Participants will learn techniques for analyzing application weaknesses, writing grammars, and obtaining test corpora guaranteeing exciting results.
After understanding the aspects of bughunting, the time will come to automate vulnerability analysis and debugging methods to ensure that defective code elements are quickly found.
The training focuses on x86 / x64 architecture, and attacking projects processing data in various formats (text, binary), network fuzzing on Windows and Linux platforms.
Syllabus:
- Why should you look for security vulnerabilities?
- Why is it worth doing with fuzzers and automated methods?
- The most common security problems in software and mitigation mechanisms
- Vulnerability classes
- Protection mechanisms
- Vulnerability research workflow
- Eight fuzzing laws
- Fuzzers under the hood and many a fuzzer's names
- Guided fuzzing
- Dumb fuzzing
- Smart fuzzing
- Mutation based fuzzing
- Generation based fuzzing
- Hypervisors specializing in fuzzing
- Fuzzing = Unit Tests with DeepState?
- Antifuzzing
- Introduction to fuzzing on GNU / Linux
- How to find a promising component to attack?
- Evolution and testing of code coverage
- Whitebox attacking
- Greybox attacking
- Blackbox attacking fuzzing on Windows and Linux
- Other dimensions of fuzzing
- Large scale fuzzing
- Static code analysis
- Make vulnerability reporting great again!
Virustotal: https://www.virustotal.com/gui/file/62b5...?nocache=1
Download:
Please send me a private message in case the link(s) go down.

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Anubis 8.0* Android RAT sometimesiexist 501 43,698 1 hour ago
Last Post: courchmikol
  (UPDATED) Top Telegram Channels list [2025] rpirate 1,219 24,770 3 hours ago
Last Post: intellnotbroker
  Red Team Development and Operations [PDF] masterpiece 13 407 4 hours ago
Last Post: kkkato
  [FREE] CRTO I and II - Red Team Ops lessons by Zero-Point Security Tamarisk 1,703 142,132 6 hours ago
Last Post: CtrlAltDefeatzzzz
  [FREE] OSCP huge resources bundle - lab & previous exams writeups Tamarisk 1,900 173,868 6 hours ago
Last Post: CtrlAltDefeatzzzz

Forum Jump:


 Users browsing this forum: 1 Guest(s)