Proj 0: Using Jasmin to run x86 Assembly Code (15 pts.) Vulnerability Discovery We'll skip chapter 15Ĭh 16: Fault Injection and 17: The Art of Fuzzing Lecture 7: Intro to 64-Bit Assembler (Not in book) PDF Windows Ch 6: The Wild World of Windows Introduction to Exploitation: Linux on x86Ĭh 4: Introduction to format string bugs (rev. Lecture 7: Intro to 64-Bit Assembler (Not in book)Ĭlass Cancelled for CyberSecureGov in Washington, DC ![]() If you take the quiz twice, the second score is the one that counts, not necessarily the higher score.Īuthor, 'Inside Cyber Warfare' (O'Reilly Media 2009, 2011) Each quiz has 5 questions, you have ten minutes to take it, and you can make two attempts. Each quiz is available for one week, up till 8:30 am Saturday. You will need to study the textbook chapterīefore the lecture covering it, and take the quiz before that class. However, you may not ask other people to help you during the quizzes. The quizzes are multiple-choice, online, and open-book. "The Shellcoder's Handbook: Discovering and Exploiting Security Holes ", by Chris Anley, John Heasman, Felix Lindner, Gerardo Richarte ASIN: B004P5O38Q Find stack overflow vulnerabilities and exploit themģ. Read and write basic assembly code routinesĢ. Student Learning Outcomes (measured to guide course improvements)ġ.
0 Comments
Leave a Reply. |