Where to start with exploit development
HTML-код
- Опубликовано: 3 окт 2024
- Browser Exploitation Introduction: • Browser Exploitation I...
Introduction to Buffer Overflows: • Hacker Techniques Int...
Modern Windows Kernel Exploitation: • A Look at Modern Windo...
Linux Heap Exploitation: • Introduction to Linux ...
Modern Binary/Patch Diffing: • Modern Binary/Patch Di...
Crypto and Blockchain Hacks: • A Technical Look at Re...
My apologies for some of the technical issues in this interview. Zoom is a nightmare :(
// Stephen's Social //
Twitter: / steph3nsims
RUclips Live: www.youtube.co...
RUclips videos: www.youtube.co...
E-mail: Stephen(at)deadlisting.com
// Stephen's courses //
SANS Course sans.org. www.sans.org/c...
Advanced exploit development for penetration testers course
Advanced penetration testing, exploit writing, and ethical hacking (GXPN)
ARM Exploit Development
// Books discussed //
Grey Hat Hacking: amzn.to/3B1FeIK
Hacking: The art of Exploitation: amzn.to/3Us9Uts
The Shellcoder’s Handbook: amzn.to/3VqUEhY
Linkers & Loaders: amzn.to/3itqtbe
// Websites discussed //
Zerodium: zerodium.com/
Corelan Cybersecurity Research: www.corelan.be/
Shellphish: github.com/sul...
Vergilius Project: www.vergiliusp...
// David's Social //
Discord: / discord
Twitter: / davidbombal
Instagram: / davidbombal
LinkedIn: / davidbombal
Facebook: / davidbombal.co
TikTok: / davidbombal
RUclips Main Channel: / davidbombal
RUclips Tech Channel: / @davidbombaltech
RUclips Clips Channel: / @davidbombalofficialclips
RUclips Shorts Channel: / @davidbombalshorts
Apple Podcast: davidbombal.wi...
Spotify Podcast: open.spotify.c...
apple
ios
android
samsung
exploit
exploit development
windows
linux
exploits
zero days
zero day
0day
1day
Disclaimer: This video is for educational purposes only. I own all equipment used for this demonstration. No actual attack took place on any websites.
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
#android #ios #linux - Наука
Nothing is free. If you want to get cood at something that's valuable it's going to cost you. He's 100% right. Everyone wants to skip being a beginner and jump straight to the super sexy exploitation.
Great video , been killing it these past few months with the interviews fr 🔥
Best channel for this stuff, As usual David's Bum's balled is thr best teacher 🤙
Pls make a video on nethunter installation on a unsupported device if possible
what device
@@darkshadow_boy Android device name is redmi 3s prime I have that as my secondary phone
@@harshjayt ok and if you root it? if don't try to find the resource and do
@@darkshadow_boy I got it rooted with latest magisk
What's the name of the person that got interviewed? as they don't have social media, how we can connect. Any course on exploit development from zero to pro.?
His name is Stephen sims
You'll find him there
Channel name is "off by one security"
Really nice video
My little comment: IDA is made by 10 people. Ghidra by hundreds of engineer. Ghidra decompiler is way more efficient than IDA one. Heil Ghidra!
Its not true. IDA decompiler is much more precise
@@knodesecSays who ? With which experience/proof ? They literally try to copy what ghidra does lol... Just write a simple C++ with strings and look at the decompiled code IDA create and Ghidra create. Only one will display a string variable, the other one, garbage, will display several variable containing one char.
Hlo David
Introduction to C++? Good luck, those books will hit you like a driverless train on full speed.
Really? Rather hyperbolic
@@WilliamRaezer I've been trying to learn it since ~ 2018, all the books were hard for me - some weren't deep enough but supplied lots of details, some were too deep and bored me to leave them. It's a tough language to learn.
Is this a subset of malware analyst ?.
It will massively help.