Don't like this style? Click here to change it! blue.css

LOGIN:
Welcome .... Click here to logout

The Last Class

Well thank you for a really wonderful semester. I've enjoyed the energy and encouragement to go as deep as we've ever gone into x86 exploitation. I know not everyone will have kept pace to the end (completely expected) but I will keep the videos up and the notes will stay up until the start of next spring (then be archived at https://sec.prof.ninja/spring22).

Feel free to DM me in Discord for any help you need in the future.

This iteration of this course will lead to a vulnerability hunting team here at UD and you're welcome to stay involved.

A look back:

I like to list off the various skills we've explored during the semester:

In fact, let's do a quick jaunt through the mastery tasks with emojis.

I added stoplight colors to our mastery tasks in the discord, adjust each of them to reflect your current mastery of the concepts.

Green means you could probably deploy the skill in a live scenario.

Yellow means you think you get it intellectually but need to practice.

Red means you've got no idea what I'm talking about.

Last mastery check-in

OK so what sort of stuff did we cover:

Pretty deep.

What's missing?

We took an interesting path through this topic.

So what would I have liked to cover with you that we didn't?

Secure Software Design?

So for the CISC students who came in with different expectations I do want to confirm that the topic is in-fact one and the same. I encourage you to learn the CERT guidelines real quick:

Let's go through them real quick: CERT Coding Standards

memset your junk and delete your pointers.

Help make the world secure and not just the one project.

There is a whole world of secure software processes: almost like a project management class. Something like this:

Take a look at the SDL: SDL from microsoft

I also find it helps to contextualize all of this by looking at the MITRE ATTACK framework:

Use the charts: https://attack.mitre.org/matrices/enterprise/

Sure, but what about a PWN career?

OK so suppose you love PWNing like me and want to make a career of it?

So being a top CTFer is a great job door-opener, we learned about them because a large company uses CTFs as their cyber interview process (top score gets the job).

But also bug bounties, CVE hunting, malware detection, forensics.

OK so what about more practice?

Here are a ton of problem sets:

CTF flowcharts

Also compete every weekend with us!

OK Go Forth

Thanks again, I wish you nothing but the best. Any way I can help let me know.