![]() |
Violent Python and Exploit DevelopmentWinter Working Connections -- Frisco, TexasDec 15-17, 2014 Sam BowneSchedule · Lecture Notes · Projects · Links · Home Page
|
![]() |
Class DescriptionEven if you have never programmed before, you can quickly and easily learn how to make custom hacking tools in Python. In hands-on projects, participants will create tools and hack into test systems, including:
In the exploit development section, students will take over vulnerable systems with simple Python scripts. Hands-on projects will include:
Technical RequirementsParticipants need a computer (Windows, Mac, or Linux) with VMware Player or VMware Fusion. USB thumbdrives will be available with Kali Linux and Windows Server 2008 virtual machines to use.All the class materials are freely available on my Web page (samsclass.info) for anyone to use. Prerequisite KnowledgeParticipants should be familiar with networking and security concepts at the Network+ and Security+ level. Previous programming experience is helpful but not necessary.Learning OutcomesUpon successful completion of this course, the student will be able to:
TextbooksViolent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers by TJ O'Connor -- ISBN-10: 1597499579 (2012) Buy from Amazon
The Shellcoder's Handbook: Discovering and Exploiting Security Holes, by Chris Anley, John Heasman, Felix Lindner, Gerardo Richarte; ASIN: B004P5O38Q
Buy from Amazon |
Schedule | ||||
---|---|---|---|---|
Mon 12-15 | Violent Python | |||
Tue 12-16 | Exploit Development | |||
Wed 12-17 | Special Topics TBA | |||
| ||||
8:30 am morning class starts 10:30 am - 10:45 am break 12:00 pm morning class ends for lunch
1:00 pm afternoon class starts |
LecturesViolent PythonViolent Python: Introduction and Motivation (pptx)
Demo: Banner-grabbing -- students do Projects 2 & 3
When Vulnerability Disclosure Gets Ugly
Data Breaches and Password Hashes (pptx)
Demo: Password hashes -- students do Projects 6 & 7
Demo: Antivirus evasion -- students do Projects 8 - 10 Exploit DevelopmentCh 1: Before you Begin (pptx)Ch 2: Stack overflows on Linux (pptx)
Exploiting Windows: Introduction
The lectures are in Word and PowerPoint formats. |