Shellcode

Results: 175



#Item
1

Network-Level Polymorphic Shellcode Detection Using Emulation Michalis Polychronakis1 , Kostas G. Anagnostakis2 , and Evangelos P. Markatos1 1 Institute of Computer Science, Foundation for Research & Technology – Hell

Add to Reading List

Source URL: www.ics.forth.gr

- Date: 2012-03-22 09:28:01
    2

    ShellNoob Because writing shellcode is fun, but sometimes painful Black Hat USA Arsenal 2013

    Add to Reading List

    Source URL: media.blackhat.com

    - Date: 2013-07-31 03:51:50
      3

      http://www.nologin.org Understanding Windows Shellcode skape

      Add to Reading List

      Source URL: hick.org

      - Date: 2007-08-26 07:19:02
        4

        Look Mom, I don’t use Shellcode Browser Exploitation Case Study for Internet Explorer 11 Moritz Jodeit (@moritzj) Agenda

        Add to Reading List

        Source URL: www.syscan360.org

        - Date: 2016-12-04 21:58:42
          5Computing / Computer security / Software bugs / Address space layout randomization / Gadget / Buffer overflow / Return-to-libc attack / Shellcode / Instruction selection / Position-independent code / NOP / Return-oriented programming

          Q: Exploit Hardening Made Easy Edward J. Schwartz, Thanassis Avgerinos and David Brumley Carnegie Mellon University, Pittsburgh, PA {edmcman, thanassis, dbrumley}@cmu.edu

          Add to Reading List

          Source URL: users.ece.cmu.edu

          Language: English - Date: 2014-05-29 15:38:01
          6Computing / Cryptography / Computer architecture / Computer network security / Shellcode / Data structure alignment / X86 / Kerberos / Transmission Control Protocol

          Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz I Solutions

          Add to Reading List

          Source URL: css.csail.mit.edu

          Language: English - Date: 2016-01-29 11:50:05
          7Computer security / Computing / Cyberwarfare / Software bugs / Computer errors / Shellcode / Buffer overflow / Return-oriented programming / Heap overflow / Address space layout randomization / Symbolic execution / Exploit

          doi:The idea is to identify security-critical software bugs so they can be fixed first. By Thanassis Avgerinos, Sang Kil Cha, Alexandre Rebert, Edward J. Schwartz, Maverick Woo, and David Brumle

          Add to Reading List

          Source URL: users.ece.cmu.edu

          Language: English - Date: 2014-05-29 15:38:01
          8DLL injection / CrowdStrike / Shellcode / Rootkit / Hooking / Malware

          ANTI-INCIDENT RESPONSE Nick Harbour, Principal Consultant © 2012 CrowdStrike, Inc. All rights reserved. Nick Harbour - Bio • 14 Years of Intrusion Analysis

          Add to Reading List

          Source URL: digital-forensics.sans.org

          Language: English - Date: 2012-06-29 08:39:58
          9Software testing / Rich Text Format / Technical communication / Hacking / VirusTotal / Computer virus / Antivirus software / Vulnerability / Shellcode / MIME

          Antiy Labs The Latest APT Attack by Exploiting CVE2012-0158 Vulnerability Antiy Labs

          Add to Reading List

          Source URL: www.antiy.net

          Language: English - Date: 2013-05-15 23:32:53
          UPDATE