David X. Fu
David X. Fu
  • Видео 71
  • Просмотров 81 494

Видео

Attack a vulnerable program using strcpy() and large enough buffer with C from command line
Просмотров 36611 месяцев назад
Tutorial: github.com/xinwenfu/Malware-Analysis/tree/main/Buffer-Overflow/BOF-PartialOverwriting/Example3
Attack a vulnerable program using gets() and large buffer with Python from command line
Просмотров 4211 месяцев назад
Tutorial: github.com/xinwenfu/Malware-Analysis/tree/main/Buffer-Overflow/BOF-PartialOverwriting/Example2
Attack a vulnerable program using gets() and small buffer with Python from command line
Просмотров 2111 месяцев назад
Tutorial: github.com/xinwenfu/Malware-Analysis/blob/main/Buffer-Overflow/BOF-jmpesp/Example2/ The shellcode (i.e., malcious code) pops up the calcualtor and is benign
FrausDNS + INetSim for malware analysis
Просмотров 828Год назад
FrausDNS is a Windows DNS Spoofer designed to capture DNS requests made from malware. it can be found at github.com/ChrisM09/FrausDNS/tree/master/Executable INetSim simulates various Internet services. This demo runs INetSim on Kali VM and FrausDNS on Windows VM. All DNS requests on Windows VM are captured by FrausDNS, which returns DNS responses with the IP address of Kali VM. In this way, "al...
Attack a vulnerable chat server with Armitage and detect the attack
Просмотров 371Год назад
0:00 Attack a vulnerable chat server with Armitage 13:57 Detect the attack
Create a new metasploit module
Просмотров 8352 года назад
Tutorial here: github.com/xinwenfu/Malware-Analysis/blob/main/MetasploitNewModule
Armitage for penetration testing
Просмотров 1732 года назад
Armitage for penetration testing
mitmproxy against https communication between ESP32 and web server
Просмотров 3372 года назад
mitmproxy against https communication between ESP32 and web server
Enable https with Apache at Ubuntu
Просмотров 1,5 тыс.2 года назад
Pretty much I follow this tutorial www.rosehosting.com/blog/how-to-enable-https-protocol-with-apache-2-on-ubuntu-20-04/ to enable the https protocol with Apache at Ubuntu.
Wireshark capturing attack and displaying it
Просмотров 802 года назад
Wireshark capturing attack and displaying it
Armitage + Metasploit for penetration testing: from port scanning to post exploitation
Просмотров 3,8 тыс.2 года назад
☘ If you cannot find any attacks with Armitage, please configure, Armitage → Set Exploit Rank → Poor ☘ If Armitage "Find Attacks" is stuck, refer to github.com/rsmudge/armitage/issues/229 Do this cd /usr/share/metasploit-framework/modules/exploits/linux/misc sudo mv saltstack_salt_unauth_rce.rb saltstack_salt_unauth_rce.rb.bkp ☘ Introduction to Armitage: www.offensive-security.com/metasploit-un...
Metasploit: meterpreter starting a camera
Просмотров 2,3 тыс.3 года назад
Metasploit: meterpreter starting a camera
Remote Desktop Protocol (RDP) into Cyber Range from Windows
Просмотров 543 года назад
Remote Desktop Protocol (RDP) into Cyber Range from Windows
Remote Desktop protocol (RDP) into Cyber Range Server on Mac
Просмотров 1123 года назад
Remote Desktop protocol (RDP) into Cyber Range Server on Mac
SurfacePro RDP into Kali VM
Просмотров 563 года назад
SurfacePro RDP into Kali VM
John the ripper
Просмотров 583 года назад
John the ripper
File transfer via remote desktop protocol (RDP)
Просмотров 3783 года назад
File transfer via remote desktop protocol (RDP)
Persistent backdoor after buffer overflow attack getting inside of Windows 10
Просмотров 2953 года назад
Persistent backdoor after buffer overflow attack getting inside of Windows 10
Install and use Microsoft remote desktop app to connect to remote VM/PC
Просмотров 1 тыс.3 года назад
Install and use Microsoft remote desktop app to connect to remote VM/PC
Team Viewer on Windows 10 and Kali VM in Cyber Range
Просмотров 273 года назад
Team Viewer on Windows 10 and Kali VM in Cyber Range
Backdooring Putty
Просмотров 1733 года назад
Backdooring Putty
Backdoor added to the Run Windows registry key
Просмотров 733 года назад
Backdoor added to the Run Windows registry key
Adding a backdoor to Windows registry key Run
Просмотров 6023 года назад
Adding a backdoor to Windows registry key Run
How the stack is used with an example of assembly code
Просмотров 1643 года назад
How the stack is used with an example of assembly code
How the stack is used with an example of c code
Просмотров 1523 года назад
How the stack is used with an example of c code
5 20 2021 Gencyber kickoff meeting
Просмотров 113 года назад
5 20 2021 Gencyber kickoff meeting
Vulnserver chat via Telnet
Просмотров 563 года назад
Vulnserver chat via Telnet
MITM against vulnserver chat server
Просмотров 233 года назад
MITM against vulnserver chat server
DoS against vulnserver chat server
Просмотров 193 года назад
DoS against vulnserver chat server