CSI3508: Ethical Hacking & Defence - Exploit Development Workshop 6
VerifiedAdded on 2023/06/05
|6
|1003
|290
Report
AI Summary
This report focuses on exploit development within the context of ethical hacking and defense, specifically addressing Workshop 6 of the CSI3508 course. It covers setting up virtual machines in host-only mode, using Network Address Translation (NAT) for IP address security, and employing the Immunity debugger for code analysis. The report details how to run programs with the debugger, interpret CPU instructions, registers, stack, and memory dumps. It explains the process of identifying denial-of-service attacks using machine learning systems and weaponizing vulnerabilities by determining hardware and software resources, assessing asset values, identifying security vulnerabilities, and mitigating risks. The report also discusses determining the offset of EIP, redirecting execution flow through a JMP ESP address, developing shellcode, and exploiting vulnerabilities to gain control or access data. The process involves using tools like pattern_create.rb and pattern_offset.rb in Kali Linux, and emphasizes the importance of a comprehensive incident response process.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
1 out of 6