Strategic Security, Inc. © Exploit Development For Mere Mortals Part 1: Getting Started Presented By: Joe McCray
Strategic Security, Inc. © Who Is This Talk For? Who is this for? Security Professionals and hobbyists interested in understanding exploit development Security Professionals and hobbyist interested in the fundamentals of writing exploits No Geekenese: This is NOT a technical, although there will be some technical info – it’s more of a getting started guide than anything else
Strategic Security, Inc. © Things I’ll Be Covering Today What programming languages you need to know? What are the best ways to learn these languages? What tools do you need? Which tools should you start with first? What references you use to get started and more importantly what to avoid?
Strategic Security, Inc. © What Programming Languages Do I Need To Know/Learn? An Interpreted Language (Perl, Python, Ruby) C Assembly
Strategic Security, Inc. © What Programming Languages Do I Need To Know/Learn? If you are new to programming – start with an interpreted language first Perl, Python, Ruby Youtube is your friend – the best I’ve seen is from ‘thenewboston’ Python: Ruby: Perl used the be the exploit and tool development language of choice Now it’s Python and Ruby
Strategic Security, Inc. © What Programming Languages Do I Need To Know/Learn? The C Programming Language Greg Perry is an amazing teacher of programming languages I highly recommend “Absolute Beginner’s Guide to C” Publisher: Sams; 2nd Edition ISBN-10: ISBN-13:
Strategic Security, Inc. © Vivek Ramachandran The Assembly Programming Language Assembly For Hackers Video Series: What Programming Languages Do I Need To Know/Learn?
Strategic Security, Inc. © What Tools Do You Need? Virtualization Platform (VMWare, VirtualBox, etc) Target VMs (XPSP3, Win7, Ubuntu 10) Debuggers OllyDBG: Immunity: WinDBG: IDA Pro: Vulnerable Software Exploit Code
Strategic Security, Inc. © Which Tools Should I Start With First? For your first few times dealing with simple exploits I’d recommend OllyDBG After that I think you should move to either Immunity or WinDBG I would say that IDA Pro should be left for advanced users
Strategic Security, Inc. © What References Should I Use To Learn ED And Which Should I Avoid? If you are BRAND NEW – start with these tutorials: development/ development/ If you have a little experience – start with the Corelan.be tutorials basic-exploit-development/ aslr /
Strategic Security, Inc. © What References Should I Use To Learn ED And Which Should I Avoid? To break up the monotony I’d recommend doing some reversing tutorials Stay away from the majority of books on Buffer Overflows Way too much focus on source code Way too much focus classic buffer overflows on old OSs Books I would recommend (after you’ve done the tutorial list earlier) are: Art of Exploitation Shellcoder’s Handbook
Strategic Security, Inc. © What References Should I Use To Learn ED And Which Should I Avoid? If you are going to take a class at a security conference: Exploit Labs with Saumil Shah Corelan Live with Peter Van Eeckhoutte
Strategic Security, Inc. © Major Resources Vivek Ramachandran Assembly For Hackers Video Series: Exploit Development Basics Video Series
Strategic Security, Inc. © Major Resources Peter Van Eeckhoutte Hands-Down Probably The Best Tutorials on the market: basic-exploit-development/ aslr/
Strategic Security, Inc. © Tutorial Lists Basics: More All-Encompassing List
Strategic Security, Inc. © Specific Exploit Topics Basics: More All-Encompassing List
Strategic Security, Inc. © Contact Me.... Toll Free: Twitter: LinkedIn: