In this video series we will learn the basics of Buffer Overflow
attacks and demonstrate how one can exploit Buffer Overflows in
programs for fun and profit. The pre-requisite for this video series is
that you are familiar with Assembly language. If you are not familiar
with Assembly language, no worries, I have created detailed video
tutorials for Assembly language here - Assembly Language Primer for
In Part 1 of the Buffer Overflow
series we will look at why buffer overflow attacks happen. We will
discuss how the is laid out when a function call happens, then how a
buffer can be overwritten if proper bounds checking does not happen and
finally how a hacker could take control of the program by
overwriting the return address stored on the stack to an
arbitrary value.We will use a sample program - Demo.c to demonstrate how
it is possible to change the Return address by overwriting the stack
using user supplied input.
In this Blackhat 2009 talk titled "Blinded by Flash: Widespread Security Risks Flash Developers Don't See" Prajakta Jagdale describes the attack surface flash applications have based on various things developers overlook. In this presentation she talks about the basic cross domain security model between flash applets, Cross Site Scripting attacks on Flash applications, Data injection attacks, Flash malware, decompilation of Flash swf files, code and binary obfuscation and many other attack vectors which a malicious attacker could use to hack Flash applications. The talk also saw the release of the SWFScan tool which is a decompiler for Flash applications. Additionally, it can also run various code vulnerability assessments using static analysis on the decompiled flash swf code.
Cross Site Scripting (XSS) is a code injection vulnerability found in web applications and is generally used by malicious hackers to hijack a legitimate user's session with the website. XSS vulnerabilities are caused because of improper validation of user input by the Server and then sending this invalidated input back to the user in some exploitable form. A great resource to track the latest XSS vulnerable software, websites and latest research is XSSed.com
1. Quick Overview: This video explains the basics of XSS, kinds of XSS - Persistent, Non-Persistent and DOM based.
2. Protecting your Website against XSS Attacks: This video explains various techniques which can be used to mitigate XSS vulnerabilities on your website - input / output validation, modification of output tags etc.
A demonstration of “sipautohack” scanning an internal network that has
3 SIP devices. For each SIP device that acts as a PBX (registrar) it
then identifies the extensions by trying to guess commonly used
extension names. For example 1234,2345, 5000,6000 etc. Once it
identifies a valid extension such as 6001, it will try to identify
neighboring extensions such as 6002,6003 etc. Finally it will try to
crack the password for each extension on the PBX. In this example, the
target PBX servers are Communigate Pro and Asterisk.