際際滷shows by User: ShaneWilton / http://www.slideshare.net/images/logo.gif 際際滷shows by User: ShaneWilton / Wed, 24 Sep 2014 18:08:52 GMT 際際滷Share feed for 際際滷shows by User: ShaneWilton Software to the slaughter /slideshow/software-to-the-slaughter/39496557 fyq1jpkltbycwg2yiswx-signature-89c49ffbdd47c164acc986d7d5be6894fc98b19491b73afd98aef264299e7537-poli-140924180852-phpapp01
An introduction to exploit development. I gave this talk at Hack the North 2014, and most of this information is pulled out of classics like Smashing the Stack for Fun and Profit, so there shouldn't be anything novel in here.]]>

An introduction to exploit development. I gave this talk at Hack the North 2014, and most of this information is pulled out of classics like Smashing the Stack for Fun and Profit, so there shouldn't be anything novel in here.]]>
Wed, 24 Sep 2014 18:08:52 GMT /slideshow/software-to-the-slaughter/39496557 ShaneWilton@slideshare.net(ShaneWilton) Software to the slaughter ShaneWilton An introduction to exploit development. I gave this talk at Hack the North 2014, and most of this information is pulled out of classics like Smashing the Stack for Fun and Profit, so there shouldn't be anything novel in here. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/fyq1jpkltbycwg2yiswx-signature-89c49ffbdd47c164acc986d7d5be6894fc98b19491b73afd98aef264299e7537-poli-140924180852-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> An introduction to exploit development. I gave this talk at Hack the North 2014, and most of this information is pulled out of classics like Smashing the Stack for Fun and Profit, so there shouldn&#39;t be anything novel in here.
Software to the slaughter from Quinn Wilton
]]>
1026 2 https://cdn.slidesharecdn.com/ss_thumbnails/fyq1jpkltbycwg2yiswx-signature-89c49ffbdd47c164acc986d7d5be6894fc98b19491b73afd98aef264299e7537-poli-140924180852-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
One Shellcode to Rule Them All: Cross-Platform Exploitation /slideshow/one-shellcode-to-rule-them-all/36998468 05dguqt6qwmv7xrqqjxl-signature-00c3af38ab9dc48de63ade0d3daa9717657e325204e698ef2df94ec7748bd287-poli-140715083152-phpapp02
As the internet of things becomes less a buzzword, and more a reality, we're noticing that it's growing increasingly common to see embedded software which runs across different architectures -whether that's the same router firmware running across different models, or the operating system for a smart TV being used by different manufacturers. In a world where even your toaster might have internet access, we suspect that the ability to write cross-platform shellcode is going transition from being a merely neat trick, to a viable tool for attackers. Writing cross-platform shellcode is tough, but there's a few techniques you can use to simplify the problem. We discuss one such method, which we used to great success during the DEFCON CTF qualifiers this year. Presented by Tinfoil Security founder Michael Borohovski and engineer Shane Wilton at Secuinside 2014, in Seoul. https://www.tinfoilsecurity.com/blog/cross-platform-exploitation]]>

As the internet of things becomes less a buzzword, and more a reality, we're noticing that it's growing increasingly common to see embedded software which runs across different architectures -whether that's the same router firmware running across different models, or the operating system for a smart TV being used by different manufacturers. In a world where even your toaster might have internet access, we suspect that the ability to write cross-platform shellcode is going transition from being a merely neat trick, to a viable tool for attackers. Writing cross-platform shellcode is tough, but there's a few techniques you can use to simplify the problem. We discuss one such method, which we used to great success during the DEFCON CTF qualifiers this year. Presented by Tinfoil Security founder Michael Borohovski and engineer Shane Wilton at Secuinside 2014, in Seoul. https://www.tinfoilsecurity.com/blog/cross-platform-exploitation]]>
Tue, 15 Jul 2014 08:31:51 GMT /slideshow/one-shellcode-to-rule-them-all/36998468 ShaneWilton@slideshare.net(ShaneWilton) One Shellcode to Rule Them All: Cross-Platform Exploitation ShaneWilton As the internet of things becomes less a buzzword, and more a reality, we're noticing that it's growing increasingly common to see embedded software which runs across different architectures -whether that's the same router firmware running across different models, or the operating system for a smart TV being used by different manufacturers. In a world where even your toaster might have internet access, we suspect that the ability to write cross-platform shellcode is going transition from being a merely neat trick, to a viable tool for attackers. Writing cross-platform shellcode is tough, but there's a few techniques you can use to simplify the problem. We discuss one such method, which we used to great success during the DEFCON CTF qualifiers this year. Presented by Tinfoil Security founder Michael Borohovski and engineer Shane Wilton at Secuinside 2014, in Seoul. https://www.tinfoilsecurity.com/blog/cross-platform-exploitation <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/05dguqt6qwmv7xrqqjxl-signature-00c3af38ab9dc48de63ade0d3daa9717657e325204e698ef2df94ec7748bd287-poli-140715083152-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> As the internet of things becomes less a buzzword, and more a reality, we&#39;re noticing that it&#39;s growing increasingly common to see embedded software which runs across different architectures -whether that&#39;s the same router firmware running across different models, or the operating system for a smart TV being used by different manufacturers. In a world where even your toaster might have internet access, we suspect that the ability to write cross-platform shellcode is going transition from being a merely neat trick, to a viable tool for attackers. Writing cross-platform shellcode is tough, but there&#39;s a few techniques you can use to simplify the problem. We discuss one such method, which we used to great success during the DEFCON CTF qualifiers this year. Presented by Tinfoil Security founder Michael Borohovski and engineer Shane Wilton at Secuinside 2014, in Seoul. https://www.tinfoilsecurity.com/blog/cross-platform-exploitation
One Shellcode to Rule Them All: Cross-Platform Exploitation from Quinn Wilton
]]>
5272 5 https://cdn.slidesharecdn.com/ss_thumbnails/05dguqt6qwmv7xrqqjxl-signature-00c3af38ab9dc48de63ade0d3daa9717657e325204e698ef2df94ec7748bd287-poli-140715083152-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://public.slidesharecdn.com/v2/images/profile-picture.png https://cdn.slidesharecdn.com/ss_thumbnails/fyq1jpkltbycwg2yiswx-signature-89c49ffbdd47c164acc986d7d5be6894fc98b19491b73afd98aef264299e7537-poli-140924180852-phpapp01-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/software-to-the-slaughter/39496557 Software to the slaughter https://cdn.slidesharecdn.com/ss_thumbnails/05dguqt6qwmv7xrqqjxl-signature-00c3af38ab9dc48de63ade0d3daa9717657e325204e698ef2df94ec7748bd287-poli-140715083152-phpapp02-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/one-shellcode-to-rule-them-all/36998468 One Shellcode to Rule ...