tag:blogger.com,1999:blog-28516623140690245952024-10-25T01:47:52.521+05:30The Exploit Laboratoryhands-on exploit development training - worldwide!The Exploit Laboratoryhttp://www.blogger.com/profile/11328081570343134323[email protected]Blogger48125tag:blogger.com,1999:blog-2851662314069024595.post-75731669337850484432019-10-25T22:52:00.001+05:302019-12-14T17:10:54.246+05:30ARM-X and a brand new IoT CTF challengeA few days ago, I released the <a href="https://armx.exploitlab.net/" rel="nofollow" target="_blank">ARM-X Firmware Emulation Framework</a>. My goal was to get as close to having an IoT virtual machine as possible. ARM-X has several applications. I wrote it to emulate and pentest IoT devices and use it to teach exploit development in my ARM IoT Exploit Laboratory training. ARM-X can also be used for fuzzing IoT targets and for hosting IoT CTF challenges!<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://armx.exploitlab.net/docs/img/armx-architecture.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="487" data-original-width="800" height="241" src="https://armx.exploitlab.net/docs/img/armx-architecture.png" width="400" /></a></div>
<br />
<h3>
ARM-X Preview VM</h3>
I released a preview VM of ARM-X along with the code on October 23 2019. The image is a VMWare virtual machine using Alpine Linux as the host OS, simply because I cannot tolerate systemd. The preview release of ARM-X comes preloaded with two emulated IoT devices:<br />
<ul>
<li>DVAR - The <a href="https://blog.exploitlab.net/2018/01/dvar-damn-vulnerable-arm-router.html" rel="nofollow" target="_blank">Damn Vulnerable ARM Router</a>, which was initially released as TinysploitARM</li>
<li>Trivision 227WF IP Camera</li>
</ul>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://armx.exploitlab.net/docs/img/06-armx-trivision-browser.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="572" data-original-width="800" height="285" src="https://armx.exploitlab.net/docs/img/06-armx-trivision-browser.png" width="400" /></a></div>
<div>
<br /></div>
<h3>
ARM-X CTF Challenge #1</h3>
The Trivision IP Camera has some serious vulnerabilities in it, as expected. There are three vulnerabilities that we know of so far. And perhaps more, lurking in the shadows. The first working exploit and write-up shall win a special <a href="https://www.ringzero.training/" rel="nofollow" target="_blank">Ringzer0</a> “<a href="https://twitter.com/xavier2dc/status/1157751669511397383?s=21" rel="nofollow" target="_blank">Box of 0-days</a>” from me!<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgcgD5qLtWDEkEdbZoYdksBT5VxVn7GyJkQmlMbr69pp_DhPcaqZWtL_8xjONsk6IHkQh0e4LTJ5Um8BmAV-B1oHsXWcUj_5xRQwY7PJixkii_n1xn1uPSCwjJGz4Z7oLnDRzDjJ3yi7Pw4/s1600/B97826B1-44C3-41E6-B715-BB895A34069F.jpeg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="961" data-original-width="1280" height="300" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgcgD5qLtWDEkEdbZoYdksBT5VxVn7GyJkQmlMbr69pp_DhPcaqZWtL_8xjONsk6IHkQh0e4LTJ5Um8BmAV-B1oHsXWcUj_5xRQwY7PJixkii_n1xn1uPSCwjJGz4Z7oLnDRzDjJ3yi7Pw4/s400/B97826B1-44C3-41E6-B715-BB895A34069F.jpeg" width="400" /></a></div>
<br />
Over the next few days, I shall be dropping hints on how to debug using gdb and gdbserver with ARM-X, using dynamic analysis tools such as strace and ltrace and more. Follow <a href="https://twitter.com/therealsaumil" rel="nofollow" target="_blank">@therealsaumil</a> for updates.therealsaumilhttp://www.blogger.com/profile/07232951003057559270[email protected]0tag:blogger.com,1999:blog-2851662314069024595.post-12643340391045463732018-03-01T10:39:00.000+05:302019-02-20T17:27:14.952+05:30DVAR ROP Challenge - Bonus Round Unlocked!<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<h2>
DVAR ROP Challenge - Bonus Round Unlocked!</h2>
<h3>
THE ARM IoT EXPLOIT LABORATORY </h3>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjUf4GKCeIB2W9bOqB6PKuQUV8X2Sa5jKUl5RiQ6Coa-dgUMJx_TUqI8GYiclSB0UYA8Ms_mJvChm50odhiw_yZXIhBjGAoIBNfk7x6Fo1VpGUwOalX6FwV7E4PCHZjn06wmsJ8mWBSA2GB/s1600/dvar_lightsrv.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" data-original-height="1600" data-original-width="1269" height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjUf4GKCeIB2W9bOqB6PKuQUV8X2Sa5jKUl5RiQ6Coa-dgUMJx_TUqI8GYiclSB0UYA8Ms_mJvChm50odhiw_yZXIhBjGAoIBNfk7x6Fo1VpGUwOalX6FwV7E4PCHZjn06wmsJ8mWBSA2GB/s400/dvar_lightsrv.png" width="316" /></a></div>
<br />
I promised to announce the DVAR Bonus Challenge when I first released the Damn Vulnerable ARM Router.<br />
<br />
I was waiting for a successful completion of the first stack overflow exercise before I announced the bonus challenge.<br />
<br />
<a href="https://twitter.com/JatanKRaval/status/962790641150210048" target="_blank">@JatanKRaval</a> provided the first working solution, and so here goes - <b>bonus round unlocked!</b><br />
<br />
Part 2 of the DVAR challenge is to exploit a stack overflow in "<b>/usr/bin/lightsrv</b>" the traffic signal lights server. lightsrv is automatically started on boot, and listens on port 8080.<br />
<br />
Your task is:<br />
<ul>
<li>Find the buffer overflow vector for lightsrv</li>
<li>Crash the program and get pc=0x41414140</li>
<li>Work your way through building a proper ROP chain (XN is enabled!)</li>
<li>Get a working shell!</li>
</ul>
Hints:<br />
<br />
<span style="font-family: "courier new" , "courier" , monospace;"><b>exploitlab-DVAR:~# ps</b><br /> PID USER VSZ STAT COMMAND<br /> : : : : :<br /> 245 root 656 S /usr/bin/miniweb<br /><span style="color: blue;"> 246 root 640 S /usr/bin/lightsrv <------- [TARGET]</span></span><br />
<span style="font-family: "courier new" , "courier" , monospace;"> 292 root 1016 S -ash<br /> 321 root 1012 R ps</span><br />
<br />
<span style="font-family: "courier new" , "courier" , monospace;"><b>exploitlab-DVAR:~# cat /proc/$(pidof lightsrv)/maps</b><br />00010000-00012000 r-xp 00000000 08:00 512 /usr/bin/lightsrv<br />00022000-00023000 rw-p 00002000 08:00 512 /usr/bin/lightsrv<br />40000000-40064000 r-xp 00000000 08:00 185 /lib/libc.so<br />40064000-40065000 r-xp 00000000 00:00 0 [sigpage]<br />40073000-40074000 r--p 00063000 08:00 185 /lib/libc.so<br />40074000-40075000 rw-p 00064000 08:00 185 /lib/libc.so<br />40075000-40077000 rw-p 00000000 00:00 0<br />40078000-40089000 r-xp 00000000 08:00 2791 /lib/libgcc_s.so.1<br />40089000-4008a000 rw-p 00009000 08:00 2791 /lib/libgcc_s.so.1<br /><span style="color: red;">befdf000-bf000000 rw-p 00000000 00:00 0 [stack]</span><br />ffff0000-ffff1000 r-xp 00000000 00:00 0 [vectors]</span><br />
<br />
If you haven't played with DVAR yet, download it from here:<br />
<a href="http://blog.exploitlab.net/2018/01/dvar-damn-vulnerable-arm-router.html" target="_blank">http://blog.exploitlab.net/2018/01/dvar-damn-vulnerable-arm-router.html </a><br />
<h3>
UPCOMING ARM IoT EXPLOIT LABORATORY TRAINING</h3>
<h4>
Cansecwest Vancouver 2019 (4 day) March 16-19</h4>
<a href="https://cansecwest.com/dojos/2019/exploitlab.html">https://cansecwest.com/dojos/2019/exploitlab.html</a><br />
<h3>
</h3>
<h4>
Hack In The Box Amsterdam HITB2019AMS (3 day) May 6,7,8</h4>
<a href="https://conference.hitb.org/hitbsecconf2019ams/sessions/3-day-training-1-the-arm-exploit-laboratory/">https://conference.hitb.org/hitbsecconf2019ams/sessions/3-day-training-1-the-arm-exploit-laboratory/</a><br />
<br />
Have fun with DVAR-ROP! <br />
<h3>
</h3>
<h4>
</h4>
therealsaumilhttp://www.blogger.com/profile/07232951003057559270[email protected]0tag:blogger.com,1999:blog-2851662314069024595.post-89055416642431712482018-01-13T19:01:00.001+05:302019-02-20T17:26:06.941+05:30DVAR - Damn Vulnerable ARM Router<h2>
Damn Vulnerable ARM Router (DVAR)</h2>
<h3>
THE ARM IoT EXPLOIT LABORATORY</h3>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghXZ-lCOHptyaKGZJML6jDgDK_zF9GtmpKBFxqws7qfz-PWaZz1tIRzjJvMSybZf7l-TCSXvIIqMq6G1APBovLFS_Rc8M4lh43g0CDy1W48IlgOneJKjtxBkrpbr6wgdWWNBaFcIpoJZAc/s1600/dvar_webconsole.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="858" data-original-width="1600" height="340" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghXZ-lCOHptyaKGZJML6jDgDK_zF9GtmpKBFxqws7qfz-PWaZz1tIRzjJvMSybZf7l-TCSXvIIqMq6G1APBovLFS_Rc8M4lh43g0CDy1W48IlgOneJKjtxBkrpbr6wgdWWNBaFcIpoJZAc/s640/dvar_webconsole.png" width="640" /></a></div>
<br />
DVAR is an emulated Linux based ARM router running a vulnerable web server that you can sharpen your ARM stack overflow skills with.<br />
<br />
DVAR runs in the tinysploitARM VMWare VM under a fully emulated QEMU ARM router image.<br />
<br />
Simply extract the ZIP file and launch the VM via tinysploitARM.vmx. After starting up, the VM's IP address and default URL shall be displayed on the console. Using your host computer's browser, navigate to the URL and follow the instructions and clues. The virtual network adapter is set to NAT mode.<br />
<br />
Your goal is to write a working stack overflow exploit for the web server running on the DVAR tinysploitARM target. DVAR also includes a bonus challenge, follow <a href="https://twitter.com/therealsaumil" target="_blank">@therealsaumil</a> on Twitter for the bonus challenge announcement.<br />
<br />
Download URL: <a href="https://app.box.com/s/g2k7vo45ctn5lh0enrwg6i83abwindte" target="_blank">exploitlab_DVAR_tinysploitARM.zip - 47.4MB VMWare Image</a><br />
SHA256: bc6eb66b7f5c0c71ca418c809213eb452e3fbf90654856ebb0591e164d634e2b<br />
<br />
DVAR started as an optional preparatory exercise for the ARM IoT Exploit Lab.<br />
<h3>
UPCOMING ARM IoT EXPLOIT LABORATORY TRAINING</h3>
<h4>
Cansecwest Vancouver 2019 (4 day) March 16-19</h4>
<a href="https://cansecwest.com/dojos/2019/exploitlab.html">https://cansecwest.com/dojos/2019/exploitlab.html</a><br />
<h3>
</h3>
<h4>
Hack In The Box Amsterdam HITB2019AMS (3 day) May 6,7,8</h4>
<a href="https://conference.hitb.org/hitbsecconf2019ams/sessions/3-day-training-1-the-arm-exploit-laboratory/">https://conference.hitb.org/hitbsecconf2019ams/sessions/3-day-training-1-the-arm-exploit-laboratory/</a><br />
<h3>
</h3>
Saumil Shah<br />
<a href="https://twitter.com/therealsaumil" target="_blank">@therealsaumil</a>therealsaumilhttp://www.blogger.com/profile/07232951003057559270[email protected]0tag:blogger.com,1999:blog-2851662314069024595.post-33879511494967034872017-09-26T22:46:00.001+05:302017-09-26T22:46:15.897+05:30What is common between.....the ARM IoT Exploit Laboratory and the Christmas Markets in Vienna?<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmxNhyRofLiFtWR9Yqj3jyaOiTGd84gmUbqrtUPOWqwzMPJ9Fq3A_19AphWk_PlFbjr0WYJGd7U83HcIdOEXr7edb4wEgAXJOFcSVAL3aYbLPraxkDt3p68XV86rUI4XVhK5BRfi0EAtxc/s1600/deepsec2017venn.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="851" data-original-width="1280" height="424" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmxNhyRofLiFtWR9Yqj3jyaOiTGd84gmUbqrtUPOWqwzMPJ9Fq3A_19AphWk_PlFbjr0WYJGd7U83HcIdOEXr7edb4wEgAXJOFcSVAL3aYbLPraxkDt3p68XV86rUI4XVhK5BRfi0EAtxc/s640/deepsec2017venn.png" width="640" /></a></div>
<br />
The ARM IoT Exploit Lab comes to Vienna for the first time! 3 days of ARM assembly, shellcode, ROP chains, Firmware analysis, ASLR bypass and owning ARM Routers and ARM IP Cameras!<br />
<br />
Check @deepsec's blog post for more details and registration.<br />
<br />
<a href="http://blog.deepsec.net/deepsec-2017-training-arm-iot-exploit-laboratory/" target="_blank">http://blog.deepsec.net/deepsec-2017-training-arm-iot-exploit-laboratory/</a><br />
<br />
Remember, it is a 3 day training - and starts before all the other trainings at DEEPSEC2017 this year.therealsaumilhttp://www.blogger.com/profile/07232951003057559270[email protected]0tag:blogger.com,1999:blog-2851662314069024595.post-77422851804835249712017-06-27T22:09:00.000+05:302017-06-27T22:09:33.241+05:30pc=0x44444444 - The ARM Exploit Lab returns to 44CON<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2jHQHPk5JA6IV380_nWRhiJUvySV4fVnsfYHha13Kal_QTW8RTTc20oPz83ZLwDMB-Du8gNEFDZFsmua80zlxL3xkEnzQxMgMuHbw7RscwYEpwmVy-KpENAZAS1__sJygxn57Y26w1ikU/s1600/arm_exploitlab_44con2017.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" data-original-height="300" data-original-width="600" height="160" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2jHQHPk5JA6IV380_nWRhiJUvySV4fVnsfYHha13Kal_QTW8RTTc20oPz83ZLwDMB-Du8gNEFDZFsmua80zlxL3xkEnzQxMgMuHbw7RscwYEpwmVy-KpENAZAS1__sJygxn57Y26w1ikU/s320/arm_exploitlab_44con2017.png" width="320" /></a></div>
The <a href="https://44con.com/44con-training/saumil-shah-the-arm-iot-exploit-laboratory/" target="_blank">ARM Exploit Lab returns to 44CON</a> for a second year, this time with a focus on exploiting ARM/Linux IoT devices.<br />
<br />
This year, I shall be teaching a 3 day class starting with the basics of ARM Assembly, writing ARM shellcode, remote exploits, ARM ROP chains and concluding with a grand "from firmware to shell" hack of an ARM WiFi router and an ARM IP Camera. On actual hardware!<br />
<br />
And as a bonus, I will be joined by co-instructor <a href="https://twitter.com/fox0x01" target="_blank">@Fox0x01</a>, who has put together a much needed tutorial on <a href="https://azeria-labs.com/writing-arm-assembly-part-1/" target="_blank">ARM Assembly Basics</a>!<br />
<br />
If you are in London in September, there's no reason why you shouldn't be at 44CON! See you there.<br />
<br />
Class link: <a href="https://44con.com/44con-training/saumil-shah-the-arm-iot-exploit-laboratory/">https://44con.com/44con-training/saumil-shah-the-arm-iot-exploit-laboratory/</a> therealsaumilhttp://www.blogger.com/profile/07232951003057559270[email protected]0tag:blogger.com,1999:blog-2851662314069024595.post-58992864914889456172017-06-27T21:43:00.000+05:302017-06-27T21:43:50.487+05:30ARM IoT Exploit Lab debuts at Blackhat USA 2017<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgpbCQ2SwLXFyhlC7hzg7mgwq0N2jZmZQKpNlOyaBV3n9z_UPkkR5lhS3U77S6d48tf1i3-e9749RapjhqPlHZZqC-rz7T_JrfkSEKMP5oE6QSAKLh6eNf_t2DUPuaiGQhh40P92fRc-s-O/s1600/logo.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" data-original-height="266" data-original-width="600" height="141" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgpbCQ2SwLXFyhlC7hzg7mgwq0N2jZmZQKpNlOyaBV3n9z_UPkkR5lhS3U77S6d48tf1i3-e9749RapjhqPlHZZqC-rz7T_JrfkSEKMP5oE6QSAKLh6eNf_t2DUPuaiGQhh40P92fRc-s-O/s320/logo.png" width="320" /></a></div>
After a decade of teaching x86 binary exploitation at Blackhat, we are pleased to debut the ARM IoT Exploit Laboratory at Blackhat USA 2017! We are teaching two classes back to back.<br />
<br />
The weekend class "<a href="https://www.blackhat.com/us-17/training/arm-iot-exploit-laboratory-intro.html" target="_blank">ARM IoT Exploit Lab: Intro</a>" is an introduction to ARM exploit development covering ARM assembly, ARM shellcode from scratch and putting together a remote exploit targeting a Linux image running on an ARM system.<br />
<br />
This is followed by the "<a href="https://www.blackhat.com/us-17/training/arm-iot-exploit-laboratory-advanced.html" target="_blank">ARM IoT Exploit Lab: Advanced</a>" class, focusing on overcoming exploit mitigation technology such as XN (DEP) and ASLR on ARM, extracting and analysing IoT firmware and exploiting IoT binaries. We shall be building ARM ROP chains and putting together a fully working remote exploit targeting an ARM based IP Camera as well as an ARM based WiFi router - "from firmware to shell". Oh yes, we will be trying the attacks against REAL HARDWARE, not just emulators!<br />
<br />
Class links:<br />
<a href="https://www.blackhat.com/us-17/training/arm-iot-exploit-laboratory-intro.html">https://www.blackhat.com/us-17/training/arm-iot-exploit-laboratory-intro.html</a><br />
<a href="https://www.blackhat.com/us-17/training/arm-iot-exploit-laboratory-advanced.html" target="_blank">https://www.blackhat.com/us-17/training/arm-iot-exploit-laboratory-advanced.html</a><br />
<br />
One more thing, my friend <a href="https://twitter.com/fox0x01" target="_blank">@Fox0x01</a> has put together a wonderful series of tutorials on <a href="https://azeria-labs.com/writing-arm-assembly-part-1/" target="_blank">ARM Assembly Basics</a>. I highly recommend it for students who are already registered or thinking of signing up for the ARM IoT Exploit Laboratory.<br />
<br />
See you in Vegas, 18th year in a row!therealsaumilhttp://www.blogger.com/profile/07232951003057559270[email protected]0tag:blogger.com,1999:blog-2851662314069024595.post-63247231971133667982016-08-16T11:51:00.000+05:302016-08-16T11:53:50.640+05:30The ARM ExploitLab goes to 44CON London 2016<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCmhN3n9_wQaTJ9tBatlt07a0hSTV2Nl4RdM1YIj3EPj4OEYwQJdOSu0W9oqzQyFMZ1WovAO-aTClYv5HWjgEsT9A3e6SmyCCIuh7mAH5h4h-6Zb3PWuaxn8_qZJNO-zzLD-541X1pbjjc/s1600/44con_exploitlab_2016.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="103" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCmhN3n9_wQaTJ9tBatlt07a0hSTV2Nl4RdM1YIj3EPj4OEYwQJdOSu0W9oqzQyFMZ1WovAO-aTClYv5HWjgEsT9A3e6SmyCCIuh7mAH5h4h-6Zb3PWuaxn8_qZJNO-zzLD-541X1pbjjc/s320/44con_exploitlab_2016.png" width="320" /></a></div>
With the weight of the Internet shifting to ARM based devices (mobile and IoT), ARM exploit development is becoming an increasingly important skill necessary for practitioners of offensive information security.<br />
<br />
We debuted the ARM Exploit Laboratory at CanSecWest 2016, followed by SyScan and at HITB2016AMS. And as before, we bring all awesome trainings to 44CON as well! This year, we shall be offering a special 3 day ARM exploit development training at 44CON London 2016.<br />
<br />
We shall be covering core ARM exploit development concepts from the ground up, featuring:<br />
<ul>
<li>ARM Assembly Language</li>
<li>How Functions work on ARM</li>
<li>Stack Overflows on ARM </li>
<li>ARM Shellcode</li>
<li>Defeating XN on ARM</li>
<li>ARM Return Oriented Programming</li>
<li>Defeating ASLR on ARM</li>
<li>Case study - from firmware to ownership - exploiting an ARM router</li>
</ul>
44CON is less than a month away, so for those interested in signing up for the class, head over to <a href="https://44con.com/44con-training/saumil-shah-the-arm-exploit-laboratory/" target="_blank">44CON's Training Registration</a> page.<br />
<br />
See you in London next month!<br />
-- <a href="https://twitter.com/therealsaumil" target="_blank">Saumil</a>therealsaumilhttp://www.blogger.com/profile/07232951003057559270[email protected]0tag:blogger.com,1999:blog-2851662314069024595.post-28359194646534566372016-06-05T20:48:00.000+05:302016-06-05T23:11:33.425+05:30Blackhat 2016 Exploit Lab - Pre-Class Tutorials + Crackme's<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_dFxDWU0t1cwFY0YcjBj4DtfF80UbMv7z4m9ZxVsfNiktL8uXLWhyxgS06255Ls2WipFpkR80Mv3KafXIpwA5t0iJCJOUrQETUhKaO2juzb1M0FT7ZrOcUnJFStL8NsJb_x02ViDNSpRE/s1600/bh_usa_2016_poster.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_dFxDWU0t1cwFY0YcjBj4DtfF80UbMv7z4m9ZxVsfNiktL8uXLWhyxgS06255Ls2WipFpkR80Mv3KafXIpwA5t0iJCJOUrQETUhKaO2juzb1M0FT7ZrOcUnJFStL8NsJb_x02ViDNSpRE/s400/bh_usa_2016_poster.png" width="301" /></a></div>
Our Blackhat USA 2016 Exploit Lab Black Belt and Master classes are filling up fast. If you're taking our classes (or considering them), here is some introductory material - tutorials to refresh your core concepts and a couple of crackme's to try your hands at exploit writing.<br />
<br />
<h4>
Tutorials+Challenge VM for Black Belt</h4>
<ul>
<li><a href="http://www.slideshare.net/saumilshah/operating-systems-a-primer" target="_blank">Operating Systems - A Primer</a></li>
<li><a href="http://www.slideshare.net/saumilshah/how-functions-work-7776073" target="_blank">How Functions Work</a></li>
<li><a href="http://www.slideshare.net/saumilshah/introduction-to-debuggers" target="_blank">Introduction to Debuggers</a></li>
<li><a href="http://blog.exploitlab.net/2014/07/tinysploit-warm-up-exercise-on-exploit.html" target="_blank">TinySPLOIT</a> - warm up on stack overflows (<a href="https://app.box.com/s/y0iawx1ehwsc2boekvoc">30MB download</a>)</li>
</ul>
<h4>
Tutorials+Challenge VM for Lab Master</h4>
<ul>
<li><a href="http://www.slideshare.net/saumilshah/dive-into-rop-a-quick-introduction-to-return-oriented-programming" target="_blank">Dive Into ROP</a></li>
<li><a href="http://blog.exploitlab.net/2015/07/tinysploit2-exploit-development.html" target="_blank">TinySPLOIT2</a> - warm up on ROP techniques (<a href="https://app.box.com/s/szmd4e81ndurief2k6prxuh6g4a5udt9">78MB download</a>)</li>
</ul>
It is not mandatory to solve the challenges, but if you are really itching to get your hands dirty with exploit development, then go for it!<br />
<br />
If you have not yet registered for the classes, here are the registration pages:<br />
<ul>
<li><a href="https://www.blackhat.com/us-16/training/exploit-laboratory-black-belt.html" target="_blank">July 30, 31 - Exploit Lab Black Belt - browser exploits, Use-after-free, DEP, ASLR, ROP</a></li>
<li><a href="https://www.blackhat.com/us-16/training/exploit-laboratory-master.html" target="_blank">August 1, 2 - Exploit Lab Master - advanced ROP, Infoleak, 64-bit exploitation</a></li>
</ul>
-- Saumil Shah <a href="https://twitter.com/therealsaumil">@therealsaumil</a> <br />
<ul>
</ul>
therealsaumilhttp://www.blogger.com/profile/07232951003057559270[email protected]0tag:blogger.com,1999:blog-2851662314069024595.post-18293343591563796932016-06-02T18:45:00.000+05:302016-07-04T03:41:21.608+05:30There's an Intel on every desktop, but an ARM in every pocketThe Exploit Lab enters its 11th year in 2016! This year, we debuted the ARM Exploit Lab training at CanSecWest, SyScan and most recently HITB2016AMS. The response has been fantastic, with HITB2016AMS and the upcoming class at RECON 2016 Montreal completely sold out.<br>
<br>
<h4>
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidZFSdvEOcESkIcchPO_7LdLA6TKad28uvL8ZclxggrR_2Oir98tLcsN4fcSKBjWBxwcBXb3e3Y8DQXIaQIteRldcPneQ3sEdM8FNAFSZFyqRFfiq9U6C-AjOauME7VSm7-JNb-jbQnkHg/s1600/blackhat_exploitlab_2016.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="127" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidZFSdvEOcESkIcchPO_7LdLA6TKad28uvL8ZclxggrR_2Oir98tLcsN4fcSKBjWBxwcBXb3e3Y8DQXIaQIteRldcPneQ3sEdM8FNAFSZFyqRFfiq9U6C-AjOauME7VSm7-JNb-jbQnkHg/s320/blackhat_exploitlab_2016.png" width="320"></a>July/August 2016 - BLACKHAT USA</h4>
This year, we are still teaching our advanced x86/x64 Exploit Lab classes at Blackhat USA 2016 with our BLACK BELT and MASTER classes. The early bird pricing has closed, and the classes are filling up steadily.<br>
<br>
<a href="https://www.blackhat.com/us-16/training/exploit-laboratory-black-belt.html">July 30, 31 - Exploit Lab Black Belt - browser exploits, Use-after-free, DEP, ASLR, ROP</a><br>
<a href="https://www.blackhat.com/us-16/training/exploit-laboratory-master.html">August 1, 2 - Exploit Lab Master - advanced ROP, Infoleak, 64-bit exploitation</a><br>
<br>
<h4>
September 2016 - 44CON UK</h4>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiP0cTsr8EbhQQ6jpZ9mMm1owJWunjPvsx5iD-6a4g5A0ioQojqwvzzp1J6xlkiVZZAhhlwUTPlAstroAKVmkW0EHRjMOLrVgBOHHUBtjJgsbDfTczaIs1B9hIPCX3husYp0mx1kpUz3fQF/s1600/44con_exploitlab_2016.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="103" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiP0cTsr8EbhQQ6jpZ9mMm1owJWunjPvsx5iD-6a4g5A0ioQojqwvzzp1J6xlkiVZZAhhlwUTPlAstroAKVmkW0EHRjMOLrVgBOHHUBtjJgsbDfTczaIs1B9hIPCX3husYp0mx1kpUz3fQF/s320/44con_exploitlab_2016.png" width="320"></a></div>
We have a 3-day version of the ARM Exploit Lab at 44CON, featuring a primer on ARM Assembly language, writing ARM Shellcode and culminating with bypassing XN with ARM ROP. Register at <a href="https://44con.com/44con-training/saumil-shah-the-arm-exploit-laboratory/">44CON's Training Page</a>.therealsaumilhttp://www.blogger.com/profile/07232951003057559270[email protected]0tag:blogger.com,1999:blog-2851662314069024595.post-6773704971061006042015-07-20T10:26:00.000+05:302015-07-21T02:07:23.933+05:30TinySPLOIT2 - Exploit development exercises for ROP<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2c-k7sg1wn4aAZpiCxMDYv9zZVPgWC_Xry5YgK5S0-d3vnr6RRdA1BJcgrjtLL6HQLISTfmgSKeOWD1GSvJkdS3FIY6iZm2l9iihfsqPCYnY7J4bb9v-ohv-KuvcOBQm93csUDR5tg-zL/s1600/tinysploit2.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="333" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2c-k7sg1wn4aAZpiCxMDYv9zZVPgWC_Xry5YgK5S0-d3vnr6RRdA1BJcgrjtLL6HQLISTfmgSKeOWD1GSvJkdS3FIY6iZm2l9iihfsqPCYnY7J4bb9v-ohv-KuvcOBQm93csUDR5tg-zL/s400/tinysploit2.jpg" width="400" /></a></div>
The Exploit Laboratory at Blackhat USA 2015 has stepped up one level. We shall be teaching our <a href="https://www.blackhat.com/us-15/training/exploit-laboratory-black-belt.html">"Black Belt" class</a> on the weekend of August 1,2 featuring advanced topics such as DEP bypass using Return Oriented Programming and an in-depth look at Use-After-Free exploits. This shall be followed by our newest offering on August 3,4 - <a href="https://www.blackhat.com/us-15/training/exploit-laboratory-master.html">"The Exploit Lab: Master" class</a>. The Master class is an uber-advanced class. Students directly attending the Master class are expected to be proficient with ROP, Use-After-Free exploitation, heap spraying and debugging techniques.<br />
<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhtq4rk13D9inxRrXfVq6v2c4MH-8lpN5R-38kJqNp5L75SfzukhlUXK6miCPJGMt7iGDqrFfPYZeaquttNz5UEEYKsGrqn6HNKQ0kbcbaFdF2YBYXkNJ-eSv3F9rjNhv61RdUtR0b5beSq/s1600/us-15.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="111" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhtq4rk13D9inxRrXfVq6v2c4MH-8lpN5R-38kJqNp5L75SfzukhlUXK6miCPJGMt7iGDqrFfPYZeaquttNz5UEEYKsGrqn6HNKQ0kbcbaFdF2YBYXkNJ-eSv3F9rjNhv61RdUtR0b5beSq/s200/us-15.png" width="200" /></a>To put your ROP skills to the test, we present <b>TinySPLOIT2</b> - a compact Linux virtual machine featuring three exploit writing challenges, each progressively more difficult. Getting a shell now requires the use of Return Oriented Programming, some proficiency with GDB debugging, ELF binary analysis and some clever innovation.<br />
<br />
TinySPLOIT2 is a 350MB VMware image (78MB zipped) and can be <a href="https://app.box.com/s/szmd4e81ndurief2k6prxuh6g4a5udt9">downloaded here</a>. SHA256 checksum: 57f6faa605426addcdb46cde976941e89e7317cc05165e93cc8cda42d697dca8<br />
<br />
You can be up and running with TinySPLOIT2 in a matter of minutes. Boot up the VM, follow the instructions on its web page, write an exploit and get a shell. You will then need to capture the flag to enter rounds 2 and 3. Good luck and have fun ROP chaining!<br />
<br />
The older TinySPLOIT virtual machine can still be found <a href="http://blog.exploitlab.net/2014/07/tinysploit-warm-up-exercise-on-exploit.html">here</a>.<br />
<br />
Blackhat Training prices go up on the 24th of July, so if you are thinking of registering for the courses, now's the time. See you in Las Vegas in a few weeks!<br />
<br />therealsaumilhttp://www.blogger.com/profile/07232951003057559270[email protected]0tag:blogger.com,1999:blog-2851662314069024595.post-27800393953799508592015-06-27T01:46:00.002+05:302015-06-30T00:27:24.972+05:30Stegosploit Was Never An Exploit - My Paper, Toolkit And Thoughts<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKja3TD5b6MEs0MYUChNj1eMPR-tB55jQLDpXcsC9fZHndWfoAzzEE7dzYCtd6TQAxAL79ZIVyIQKZVXXtGm8rQhg8xZHv9SFBCu4Yd_VzMwPxNPaVnd3ftridG-uTeZ7EgSG_yEmTQmsM/s1600/11295578_10205784021012901_2480013597089757196_n.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="213" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKja3TD5b6MEs0MYUChNj1eMPR-tB55jQLDpXcsC9fZHndWfoAzzEE7dzYCtd6TQAxAL79ZIVyIQKZVXXtGm8rQhg8xZHv9SFBCu4Yd_VzMwPxNPaVnd3ftridG-uTeZ7EgSG_yEmTQmsM/s320/11295578_10205784021012901_2480013597089757196_n.jpg" width="320" /></a></div>
This blog is generally reserved for updates on The Exploit Laboratory, but I shall borrow it for one "guest post" on my latest exploit delivery technique - Stegosploit.<br />
<div>
<br /></div>
<div>
I have been working on browser exploit delivery using steganographic techniques since the past 5 years. I have spoken about some of these techniques at several conferences around the world. This past year, I had a few breakthroughs combining steganography with file format polyglots. The goal of Stegosploit was to demonstrate my motto: "<b>A good exploit is one that is delivered in style</b>". I demonstrated this technique at <a href="http://www.slideshare.net/saumilshah/stegosploit-hacking-with-pictures/" target="_blank">Hack In The Box 2015 Amsterdam</a>, on 28th May 2015. I "painted" an exploit on the face of my good friend Kevin McPeake, as a demonstration of browser exploit delivery via images. In <a href="http://www.slideshare.net/saumilshah/stegosploit-hacking-with-pictures" target="_blank">my slide deck</a>, I made it very clear that Stegosploit was not an exploit (although it has a cute logo associated with it). Slide 7.</div>
<div>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://image.slidesharecdn.com/stegosploithitb2015ams-150528134720-lva1-app6891/95/stegosploit-hacking-with-pictures-hitb2015ams-7-638.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="http://image.slidesharecdn.com/stegosploithitb2015ams-150528134720-lva1-app6891/95/stegosploit-hacking-with-pictures-hitb2015ams-7-638.jpg" height="240" width="320" /></a></div>
</div>
<div>
I presented private demonstrations to reporters from <a href="http://www.idigitaltimes.com/hacking-pictures-new-stegosploit-tool-hides-malware-inside-internet-images-instant-444768" target="_blank">iDigitalTimes</a> and <a href="http://motherboard.vice.com/read/how-you-can-get-hacked-just-by-looking-at-a-picture-online" target="_blank">Vice Motherboard</a>, who did a very thorough job in fact checking and representing the research as accurately as possible in a media article.</div>
<div>
<br /></div>
<div>
And then, something happened. Reddit and Twitter exploded with several scathing commentaries on my work. The backlash was caused by commenters who were not present during my presentation, nor had seen any demo or even bothered to research into the technical details that I presented. Instead, these were just conjectures and inferences derived from my older presentations at SyScan 2015 and HITB 2013 - techniques that are at best described as precursors to what Stegosploit actually is.</div>
<div>
<br />
Rather than speculate on the merits or demerits of the technique and competency of my work and research, I leave you to read this detailed paper about <span id="goog_1070185642"></span>Stegosploit in <a href="https://www.alchemistowl.org/pocorgtfo/pocorgtfo08.pdf" target="_blank">Issue 0x08 of PoC||GTFO</a><span id="goog_1070185643"></span>, the only befitting journal for publishing research of this kind!<br />
<br />
Along with the paper, I have also r<b>eleased the Stegosploit v0.2 toolkit</b>, which is packaged as a PNG image within the issue itself. It is an interesting exercise to extract the tools, and for those of you who do, it gives you a better appreciation of this kind of research. Hint: "<b>unzip pocorgtfo08.pdf</b>".<br />
<br />
Oliver Söhlke published a very well written <a href="http://magazine.vulnerability-db.com/?q=articles%2F2015%2F06%2F17%2Fexploit-delivery-steganography-using-stegosploit-tool-v02" target="_blank">interview in Vulnerability Magazine</a> clarifying my position and purpose of Stegosploit, while documenting the effects of Stegosploit on evading detection.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhcmuK-WWT9fdfFyW_zVuch9_nLX1wUEPq6E2M0kDDjytFJXPpbj0z1EnEPjqy02UHDIRHqz018Y6H1Qwgg34e4Aex2AsBZAOHuXMxNVXbcS9Xe1y_narxhHIeQQcgC-B9E_qbT_84sJCBV/s1600/cve-2013-1690-virustotal+copy.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhcmuK-WWT9fdfFyW_zVuch9_nLX1wUEPq6E2M0kDDjytFJXPpbj0z1EnEPjqy02UHDIRHqz018Y6H1Qwgg34e4Aex2AsBZAOHuXMxNVXbcS9Xe1y_narxhHIeQQcgC-B9E_qbT_84sJCBV/s400/cve-2013-1690-virustotal+copy.png" width="315" /></a></div>
<br />
<br />
In the end, I do want to publicly appreciate the fact that the author of the <a href="https://medium.com/@christianbundy/why-stegosploit-isn-t-an-exploit-189b0b5261eb" target="_blank">article published in The Medium</a> was honest enough to revise his mistake.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiQ6HbBCu3GCeznpZQc4GQ4bDdTZcnsreCv4j9-RFchDijD4M07Jn5K56EfWKK0J2ZFaPLudXn8fzKLsY-WHvogpm_sRPTaaQIXBL6HhacMb7JY59sJaB5BbkCHWW7f4lOwEXUQZuSagzn8/s1600/bundy_medium.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="372" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiQ6HbBCu3GCeznpZQc4GQ4bDdTZcnsreCv4j9-RFchDijD4M07Jn5K56EfWKK0J2ZFaPLudXn8fzKLsY-WHvogpm_sRPTaaQIXBL6HhacMb7JY59sJaB5BbkCHWW7f4lOwEXUQZuSagzn8/s400/bundy_medium.png" width="400" /></a></div>
<br />
I am looking forward to his new article on the topic.<br />
<br />
My parting piece of advice to those interested in analyzing or dissecting an an infosec research topic - when in doubt, please <b>ask the researcher</b>, instead of kicking off a troll-fest. We would be happy to help you with your fact checking and correct any mistaken assumptions. We play nice.</div>
The Exploit Laboratoryhttp://www.blogger.com/profile/11328081570343134323[email protected]0tag:blogger.com,1999:blog-2851662314069024595.post-21483351744642098302015-02-04T15:54:00.001+05:302015-02-04T15:54:05.186+05:30Exploit Lab Announcements for 2015 - CanSecWest and SyScan<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhhuV8gEhL3ZKd1pnS0QDSGpnH_p_jgXXWFWLkRQP2EnPlDT8ldfGwgDHFObOOVG4uRGTaUUPRFKIT2lgD4SlpItAStsaLBl_tyYs0NpUKhRTtUzq3F7gqP7nYOh71FdSdLG4rwxzRCVOJ1/s1600/CANSECwest.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhhuV8gEhL3ZKd1pnS0QDSGpnH_p_jgXXWFWLkRQP2EnPlDT8ldfGwgDHFObOOVG4uRGTaUUPRFKIT2lgD4SlpItAStsaLBl_tyYs0NpUKhRTtUzq3F7gqP7nYOh71FdSdLG4rwxzRCVOJ1/s1600/CANSECwest.png" height="100" width="200" /></a></div>
The Exploit Laboratory returns to CanSecWest for 2015 with two courses:<br /><div>
<br /></div>
<div>
<a href="https://cansecwest.com/dojos/2015/exploit_lab1.html" target="_blank">Exploit Lab: Advanced Browser Exploitation</a> and</div>
<div>
<a href="https://cansecwest.com/dojos/2015/exploit_lab2.html" target="_blank">Exploit Lab: Master</a></div>
<div>
<br /></div>
<div>
Advanced Browser Exploitation focuses on browser and PDF exploits on modern operating systems where students shall also learn about bypassing exploit mitigation technologies like DEP and ASLR. Special attention shall be given to Return Oriented Programming (ROP chains) and Use-After-Free (UAF) bugs. The class shall feature in-depth heap debugging for analysing and exploiting Use-After-Free bugs.</div>
<div>
<br /></div>
<div>
The Master class is an ideal extension to the Advanced Browser Exploitation class, or for students with previous exploit development training who wish to take their skills to present day competitiveness. Topics covered in the Master class include advanced ROP chains, an in-depth analysis of infoleak bugs, one-byte memory overwrite ownage, heap spraying on modern Javascript engines, server side heap spraying, kernel exploits, using ROP in kernel exploits and an introduction to 64-bit exploitation.</div>
<div>
<br /></div>
<div>
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZG9S-cDCOX5Suyt23Pdz5LkgTKvguak27XzqN6sNLeqRBg1AmcmkAZkwifvtI7dm9eV4wV9Z9k2mbvlKzPl_pWCvJ-2ldKw1zNOwGpy3x0HUoLCYwHXR9FhmUn8gwDZ1sG2fsabuOv73w/s1600/SysSG15_homepage_header_1612_01.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZG9S-cDCOX5Suyt23Pdz5LkgTKvguak27XzqN6sNLeqRBg1AmcmkAZkwifvtI7dm9eV4wV9Z9k2mbvlKzPl_pWCvJ-2ldKw1zNOwGpy3x0HUoLCYwHXR9FhmUn8gwDZ1sG2fsabuOv73w/s1600/SysSG15_homepage_header_1612_01.jpg" height="68" width="200" /></a></div>
<div>
And now for SyScan. Sad, but true, this shall be the last SyScan in Singapore. And for the finale, we shall be featuring our brand new <a href="https://syscan.org/index.php/sg/training/details/2015/sys_15_03" target="_blank">Black Box Bug Hunting and Vulnerability Discovery</a> class as a 4-day training programme. Black Box Bug Hunting complements the Exploit Laboratory training offering by taking students through the art and craft of instrumented fuzzing to find bugs in everyday software.</div>
<div>
<br /></div>
<div>
The class follows a hands-on workshop style where the emphasis is on "learn by doing" with exercises and real world fuzzing scenarios. In addition to fuzzing, we shall spend an equal amount of time in analyzing crash dumps, determining exploitability, and root cause analysis through reverse engineering.</div>
<div>
<br /></div>
<div>
This is a class and conference you don't want to miss!</div>
<div>
<br /></div>
<div>
<a href="https://twitter.com/therealsaumil" target="_blank">@therealsaumil</a></div>
The Exploit Laboratoryhttp://www.blogger.com/profile/11328081570343134323[email protected]0tag:blogger.com,1999:blog-2851662314069024595.post-27281857032766188802014-10-30T00:27:00.002+05:302014-10-30T00:27:39.637+05:30Black Box Bug Hunting - Introduction to Vulnerability Discovery and Exploit Development<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1Et3KMdVSJRWDaxPqCJYPmqA8WLsXdCokyPUOR_iHsqLike42-GCmlCiHWjAsavU8khW0XkU-aNxSV6q3gkNJbdHE5jDYBkrMbgh1BaYAzp1pueEDvdJ7ZZmo2taLFXZcLDbcjHbK4YmN/s1600/bh_bug_hunting.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1Et3KMdVSJRWDaxPqCJYPmqA8WLsXdCokyPUOR_iHsqLike42-GCmlCiHWjAsavU8khW0XkU-aNxSV6q3gkNJbdHE5jDYBkrMbgh1BaYAzp1pueEDvdJ7ZZmo2taLFXZcLDbcjHbK4YmN/s1600/bh_bug_hunting.png" height="152" width="320" /></a></div>
Our brand new training class "<b><a href="https://www.blackhat.com/tr-14/training/black-box-bug-hunting-introduction-to-vulnerability-discovery-and-exploit-development.html" target="_blank">Black Box Bug Hunting - Introduction to Vulnerability Discovery and Exploit Development</a></b>" debuts at the Blackhat Trainings in Potomac, Maryland. Black Box Bug Hunting complements the Exploit Laboratory training offering by taking students through the art and craft of instrumented fuzzing to find bugs in everyday software.<br />
<br />
Blackhat Trainings is the perfect platform to launch this 4-day intense training programme. The class follows a hands-on workshop style where the emphasis is on "learn by doing" and shall be taught to a smaller group of students. The emphasis is more on exercises and real world fuzzing scenarios. In addition to fuzzing, we shall spend an equal amount of time in analyzing crash dumps, determining exploitability, and root cause analysis through reverse engineering. For more details, read up the <a href="https://www.blackhat.com/tr-14/training/black-box-bug-hunting-introduction-to-vulnerability-discovery-and-exploit-development.html">class description</a>.<br />
<br />
All essential concepts will be taught in class. However should you wish to come better prepared, we shall be posting new tutorials shortly. If you are curious about bug hunting and vulnerability discovery, this class is not one to be missed!<br />
<br />
Oh, and one last thing. <b>Early bird pricing ends on October 31</b>.<br />
<br />
Saumil Shah<br />
<a href="https://twitter.com/therealsaumil" target="_blank">@therealsaumil</a><br />
<br />The Exploit Laboratoryhttp://www.blogger.com/profile/11328081570343134323[email protected]0tag:blogger.com,1999:blog-2851662314069024595.post-50529890942720149062014-08-26T10:54:00.000+05:302014-08-26T10:54:03.021+05:30Exploit Lab announcements - 44CON, Ruxcon/Breakpoint, Blackhat Europe, Blackhat East Coast TrainingsPresenting our training calendar for the remainder of 2014. The Exploit Laboratory trainings have been confirmed at the following events worldwide:<br />
<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPvLeG4pD6WNsd5vldZiTq17h6ek9tMrqWMw8vlNykPVKqvfgaI9fnZDR1PdbgyZzvsMnngxBUgkiU1SEonEazF47EObqWVMLhBXAZJAA2D96SKQ9otJ1wSBTbRu_3Ym2I2VMWJqDlzTTt/s1600/gb.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPvLeG4pD6WNsd5vldZiTq17h6ek9tMrqWMw8vlNykPVKqvfgaI9fnZDR1PdbgyZzvsMnngxBUgkiU1SEonEazF47EObqWVMLhBXAZJAA2D96SKQ9otJ1wSBTbRu_3Ym2I2VMWJqDlzTTt/s1600/gb.png" /></a>
September 9,10: 44CON, London (<a href="http://44con.com/training/2014/the-advanced-exploit-laboratory.html">Advanced</a>)<br />
<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhaHiMxrCelmpJn2k0yMPOxqTZ-E9EbYq4VgLdq6mktoirSRgxdUq1GlR_zIsOu758H65UZj_mAY_7WuVJ-FWbE9P8mzeBM1p_tipAF7RpztMrkfyPQ-Tl5GrkAjkAz8l4zJt35f_WvSyAF/s1600/au.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhaHiMxrCelmpJn2k0yMPOxqTZ-E9EbYq4VgLdq6mktoirSRgxdUq1GlR_zIsOu758H65UZj_mAY_7WuVJ-FWbE9P8mzeBM1p_tipAF7RpztMrkfyPQ-Tl5GrkAjkAz8l4zJt35f_WvSyAF/s1600/au.gif" /></a>
October 6,7: RUXCON, Melbourne Australia (<a href="https://ruxconbreakpoint.com/training/the-exploit-lab/">Intro/Intermediate</a>)<br />
<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhLxbWhfT4mQ_-pLIXTqsGt90WAGEb8641cm0KxaGT4YGr5uWGyp2hqoX-Ndh3nvu-Cpx32O-k7zEYY82e0LGZUFOD6ByjpFQaFyPg25Fvc2bg3yiFbGktipiJG_V-8rvPYdXr9PJqcLR26/s1600/nl.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhLxbWhfT4mQ_-pLIXTqsGt90WAGEb8641cm0KxaGT4YGr5uWGyp2hqoX-Ndh3nvu-Cpx32O-k7zEYY82e0LGZUFOD6ByjpFQaFyPg25Fvc2bg3yiFbGktipiJG_V-8rvPYdXr9PJqcLR26/s1600/nl.gif" /></a>
October 14,15: Blackhat Europe, Amsterdam (<a href="https://www.blackhat.com/eu-14/training/the-exploit-laboratory-black-belt.html">Advanced</a>)
<br />
<br />
And last but not the least, we have an all new class focusing on bug hunting and fuzzing!<br />
<br />
<b>"Black Box Bug Hunting - An Introduction to Vulnerability Discovery and Exploit Development"</b> debuts at the Blackhat East Coast Trainings, Maryland, USA from December 8-11. This is a 4-day class focused more on the art and craft of bug hunting, fuzzing, reverse engineering, crash dump analysis and performing root cause analysis of exploitability.<br />
<br />
A detailed announcement shall follow shortly.The Exploit Laboratoryhttp://www.blogger.com/profile/11328081570343134323[email protected]0tag:blogger.com,1999:blog-2851662314069024595.post-89741739375598860422014-08-09T11:04:00.000+05:302014-08-09T11:04:50.285+05:30The Advanced Exploit Laboratory returns to 44CON<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_WJobbrIdw3WnS1Jkdu0nkT0bpPke7aJiyLEiMHmATPd90Jk3D3yulo31WD3LR4MdDD_V3vLwxx9SofATrntT6fdHSZyC2s4oikEFiFUCbwo6ogvaOXWPYVtTcyKh7MwTrsWCob9W5Aa9/s1600/keepcalm_44con.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_WJobbrIdw3WnS1Jkdu0nkT0bpPke7aJiyLEiMHmATPd90Jk3D3yulo31WD3LR4MdDD_V3vLwxx9SofATrntT6fdHSZyC2s4oikEFiFUCbwo6ogvaOXWPYVtTcyKh7MwTrsWCob9W5Aa9/s1600/keepcalm_44con.png" height="200" width="188" /></a></div>
With the dust settling after Blackhat USA 2014, we are getting ready for another round of advanced exploit development training at <b>44CON</b> next month.<br />
<br />
The <a href="http://44con.com/training/2014/the-advanced-exploit-laboratory.html">Advanced Exploit Laboratory at 44CON</a> shall focus on the latest topics in exploit development - with special attention to Use-After-Free bugs, Information Leaks, Return Oriented Programming and dynamic ROP chains. The Advanced Exploit Laboratory is indeed a fast-paced class, intended for participants who already have basic exploit development experience and want to take their skills to today's cutting edge topics.<br />
<br />
If you are joining the Advanced Exploit Laboratory at 44CON and your exploit development skills need a little warm-up, we have just the thing for you! <b>TinySPLOIT</b> is a tiny (30MB) VMware virtual machine running web server vulnerable to a simple stack overflow. You may <a href="https://app.box.com/s/y0iawx1ehwsc2boekvoc">download TinySPLOIT from here</a> (<a href="http://saumil.net/exploitlab/exploitlab_tinysploit.zip">mirror link</a>). TinySPLOIT can be up and running in a few minutes. You can also <a href="http://blog.exploitlab.net/2014/07/tinysploit-warm-up-exercise-on-exploit.html">read more about TinySPLOIT</a> in our earlier blog post.<br />
<br />
In addition to TinySPLOIT, do also check out our tutorials on <a href="http://www.slideshare.net/saumilshah/how-functions-work-7776073">How Functions Work</a>, and <a href="http://www.slideshare.net/saumilshah/introduction-to-debuggers">Introduction to Debuggers</a>.<br />
<br />
See you next month in London!The Exploit Laboratoryhttp://www.blogger.com/profile/11328081570343134323[email protected]0tag:blogger.com,1999:blog-2851662314069024595.post-42875951686311625122014-07-25T23:40:00.001+05:302014-08-09T10:36:12.270+05:30TinySPLOIT - Warm-up exercise on Exploit Development<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEisfV-9IQMlILVsMdc2ySuwmld7ZiTIknhvDpRKWQgnrqOAEt6wPJXH7ERtQwuDs6cpppx7tZ1ZkVqmL0966a9ualulJ8ME81SUN62zoIL6mhPEVvGoi5FwsZu69l3cwqbshpkFGJGrRZWd/s1600/tinysploit_gandalf.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEisfV-9IQMlILVsMdc2ySuwmld7ZiTIknhvDpRKWQgnrqOAEt6wPJXH7ERtQwuDs6cpppx7tZ1ZkVqmL0966a9ualulJ8ME81SUN62zoIL6mhPEVvGoi5FwsZu69l3cwqbshpkFGJGrRZWd/s1600/tinysploit_gandalf.png" height="320" width="318" /></a></div>
This year's Exploit Laboratory classes at Blackhat USA 2014 feature completely new content. First, we have <a href="http://blog.exploitlab.net/2014/07/the-exploit-lab-bids-farewell-to-win-xp.html">retired Windows XP based exploits</a> altogether from our <a href="http://blackhat.com/us-14/training/the-exploit-laboratory-red-team.html">RedTeam class</a>. Our advanced class "<a href="http://blackhat.com/us-14/training/the-exploit-laboratory-black-belt.html">The Exploit Laboratory: Black Belt</a>" focuses on ROP, Use-After-Free, Infoleaks and 64-bit exploitation.<br />
<br />
The Black Belt class is going to be fast paced, and we mean it! We expect all Black Belt participants to be familiar with the workings of stack overflow exploits, at a minimum.<br />
<br />
Enter <b>TinySPLOIT</b> - a compact Linux virtual machine running a vulnerable web server that you can sharpen your stack overflow skills with.<br />
<br />
TinySPLOIT is a 30MB VMware image and can be <a href="https://app.box.com/s/y0iawx1ehwsc2boekvoc">downloaded here</a>. (<a href="http://saumil.net/exploitlab/exploitlab_tinysploit.zip">mirror</a>). SHA256 checksum:
6bd956c86846a21e713c9f5efa7cf286386d2b4aa654a3734b9ce9b6497fa59a<br />
<br />
You can be up and running with TinySPLOIT in a matter of minutes. Boot up the VM, follow the instructions on its web page, write an exploit and get a shell! For debugging purposes, the root password is "exploitlab" :)<br />
<br />
This shall be my 16th year in a row at Blackhat USA. This year, I shall be joined by the Exploit Lab co-developer and my dear friend S.K. who shall teach a number of new topics including 64-bit exploitation, and Eric Liu, teaching a brand new module on information leakage via 1-byte memory overwrites.<br />
<br />
Blackhat Training prices go up on the 26th of July, so if you are thinking of registering for the courses, now's the time. See you in Las Vegas in a week!The Exploit Laboratoryhttp://www.blogger.com/profile/11328081570343134323[email protected]0tag:blogger.com,1999:blog-2851662314069024595.post-87976544795407294212014-07-03T13:54:00.002+05:302014-07-03T14:07:29.387+05:30The Exploit Lab bids farewell to Win XP<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOk13Evd5C_9erLMBoc-DDiBjwZch64RWbzNyjLGTFP51CsLlU9je11APcKH-e66k07piJr3AX2PJF0s87Jvw5SpdJ8qum0nzBtXTaKxMN4t4t8ItF9hUkPoiZpLtw_PE8hdjU4kQcADxd/s1600/end_of_xp.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOk13Evd5C_9erLMBoc-DDiBjwZch64RWbzNyjLGTFP51CsLlU9je11APcKH-e66k07piJr3AX2PJF0s87Jvw5SpdJ8qum0nzBtXTaKxMN4t4t8ItF9hUkPoiZpLtw_PE8hdjU4kQcADxd/s1600/end_of_xp.png" height="135" width="320" /></a></div>
Times are changing. Desktops all around the world bid a fond farewell to Windows XP in April 2014, and The Exploit Laboratory is no exception.<br />
<br />
Exploits based on Windows XP shall not feature in the Exploit Laboratory any more.<br />
<br />
After all, it doesn't make sense to learn exploit writing on a dwindling platform, does it?<br />
<br />
The course content overhaul for Blackhat USA 2014 is complete. All exploits and examples have been revised. What was advanced content a couple of years ago has now been re-worked into our intermediate level <a href="http://www.blackhat.com/us-14/training/the-exploit-laboratory-red-team.html">Exploit Laboratory: Red Team</a> class. The <a href="http://blackhat.com/us-14/training/the-exploit-laboratory-black-belt.html">Exploit Laboratory: Black Belt</a> class shall focus on present day advanced topics such as Use-After-Free exploits, Information Leaks, Compound Exploits and Dynamic ROP chains.<br />
<br />
Our Blackhat 2014 classes are filling up fast. For those of you who have already registered, do browse through the following concepts refresher tutorials:<br />
<ol>
<li><a href="http://www.slideshare.net/saumilshah/operating-systems-a-primer">Operating Systems: A Primer</a></li>
<li><a href="http://www.slideshare.net/saumilshah/introduction-to-debuggers">Introduction to Debuggers</a></li>
<li><a href="http://www.slideshare.net/saumilshah/how-functions-work-7776073">How Functions Work</a></li>
</ol>
<br />
<br />The Exploit Laboratoryhttp://www.blogger.com/profile/11328081570343134323[email protected]0tag:blogger.com,1999:blog-2851662314069024595.post-18384710030378401102014-02-26T20:44:00.002+05:302014-02-26T20:44:58.609+05:30Exploit Lab 2014 - Cansecwest, SyScan, Recon, Blackhat USA, 44CONThe Exploit Laboratory classes have been confirmed at the following conferences. This year, we are focusing more on advanced exploit development
concepts, especially bypassing exploit mitigation techniques such as DEP
and ASLR, Return Oriented Programming, Information Leaks and Dynamic
ROP chains, and Use-After-Free bugs.<br />
<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVchqQQh78cvU7K0ETK2r67zr_-A0zrFdmGGwDRHVCV4nnZUhhfUqZ_UOtvh4ns-ZKSvo_eGCQoAsLl4gp3sAND1zL74ZEF01rldDIeIVPyseJpOKoycf8riHDeumuX34BFpK2BJmUtieW/s1600/ca.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVchqQQh78cvU7K0ETK2r67zr_-A0zrFdmGGwDRHVCV4nnZUhhfUqZ_UOtvh4ns-ZKSvo_eGCQoAsLl4gp3sAND1zL74ZEF01rldDIeIVPyseJpOKoycf8riHDeumuX34BFpK2BJmUtieW/s1600/ca.png" /></a>March 8-11: CanSecWest 2014, Vancouver (<a href="https://cansecwest.com/dojos/2014/intro_exploit_lab.html">Intro</a>, <a href="https://cansecwest.com/dojos/2014/adv_exploit_lab.html">Advanced</a>)<br />
<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh61M92rtQct3Cs4lApVI3qkmZKG6cIgAuklcRHoIlc_vbBMvOTn6y2OZF2itV0lW7dhE3jNmU_n1vUc9yrgWPJ74iOXGt0sjT70k5hTyAeHIDhyrGaQTrhKxqYeLA3hf5g_2pEfY4LF8lW/s1600/sg.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh61M92rtQct3Cs4lApVI3qkmZKG6cIgAuklcRHoIlc_vbBMvOTn6y2OZF2itV0lW7dhE3jNmU_n1vUc9yrgWPJ74iOXGt0sjT70k5hTyAeHIDhyrGaQTrhKxqYeLA3hf5g_2pEfY4LF8lW/s1600/sg.png" /></a>March 31-April 2: SyScan '14, Singapore (<a href="http://syscan.org/index.php/sg/training/details/sys_14_07">3-day Advanced</a>)<br />
<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSQYr7sabxpUTnBL9KEWt6U26rRUw2pRqrJd9BGmYEhL32RUIxYeka-p8uEFThpljC0apRsT22Q_Dv3GEXk1TkBTWNz0eIlj1W75x2n-4a7Xy130v2vfbgQDCtOc47m9fQEPSCAwBcz1zZ/s1600/ca.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSQYr7sabxpUTnBL9KEWt6U26rRUw2pRqrJd9BGmYEhL32RUIxYeka-p8uEFThpljC0apRsT22Q_Dv3GEXk1TkBTWNz0eIlj1W75x2n-4a7Xy130v2vfbgQDCtOc47m9fQEPSCAwBcz1zZ/s1600/ca.png" /></a>June 23-26: Recon 2014, Montreal (<a href="http://recon.cx/2014/trainingexploitlabred.html">Advanced</a>, <a href="http://recon.cx/2014/trainingexploitlabmaster.html">Über Advanced</a>)<br />
<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEinqArOlqRPK7pkllqyfeTzOIe1uSSJiCCF1KDNOU0-gNiA8Ikl9O46p-LvD_admAt9sxEjKAqpJ1leegiI-3JKaRvS0Wg4M2_FVnHNOYP3kjVPhh4NJGGz27P8NYmXot3QmDok6kHvscMZ/s1600/us.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEinqArOlqRPK7pkllqyfeTzOIe1uSSJiCCF1KDNOU0-gNiA8Ikl9O46p-LvD_admAt9sxEjKAqpJ1leegiI-3JKaRvS0Wg4M2_FVnHNOYP3kjVPhh4NJGGz27P8NYmXot3QmDok6kHvscMZ/s1600/us.png" /></a>August 2-5: Blackhat USA 2014, Las Vegas (<a href="http://blackhat.com/us-14/training/the-exploit-laboratory-red-team.html">Red Team</a>, <a href="http://blackhat.com/us-14/training/the-exploit-laboratory-black-belt.html">Black Belt</a>)<br />
<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJypaBEj64Svl7ZQQgGESTmsyhaVEV3TEPt5R4bFeL3T3l0WrbIdb0U-Uo9s-Q7jKvDMFgnOtO7cVv-ZhfV6ESXSXubwj1sjG4iBlAWKa38VdJt7z1dEaR_m0d-cLlB693Dogouur6OAHn/s1600/gb.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJypaBEj64Svl7ZQQgGESTmsyhaVEV3TEPt5R4bFeL3T3l0WrbIdb0U-Uo9s-Q7jKvDMFgnOtO7cVv-ZhfV6ESXSXubwj1sjG4iBlAWKa38VdJt7z1dEaR_m0d-cLlB693Dogouur6OAHn/s1600/gb.png" /></a>September 9,10: 44CON, London (<a href="http://44con.com/training/2014/the-advanced-exploit-laboratory.html">Advanced</a>)<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
Don't miss out on early bird registrations!<br />
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
The Exploit Laboratoryhttp://www.blogger.com/profile/11328081570343134323[email protected]0tag:blogger.com,1999:blog-2851662314069024595.post-41054515992769736422014-02-26T19:32:00.002+05:302014-02-26T19:40:10.243+05:30FREE VMware licenses for Exploit Lab at CanSecWest 2014!<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhhuV8gEhL3ZKd1pnS0QDSGpnH_p_jgXXWFWLkRQP2EnPlDT8ldfGwgDHFObOOVG4uRGTaUUPRFKIT2lgD4SlpItAStsaLBl_tyYs0NpUKhRTtUzq3F7gqP7nYOh71FdSdLG4rwxzRCVOJ1/s1600/CANSECwest.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhhuV8gEhL3ZKd1pnS0QDSGpnH_p_jgXXWFWLkRQP2EnPlDT8ldfGwgDHFObOOVG4uRGTaUUPRFKIT2lgD4SlpItAStsaLBl_tyYs0NpUKhRTtUzq3F7gqP7nYOh71FdSdLG4rwxzRCVOJ1/s1600/CANSECwest.png" height="100" width="200" /></a></div>
Yes you read that right. A big shout-out to the friendly folks at VMware for providing <b>FREE licenses of VMware Fusion and VMware workstation for all Exploit Laboratory students</b> at CanSecWest 2014!<br />
<br />
With CanSecWest less than 2 weeks away, there's still time to register for the <a href="https://cansecwest.com/dojos/2014/intro_exploit_lab.html">Introduction to Exploit Development Dojo</a> and the <a href="https://cansecwest.com/dojos/2014/adv_exploit_lab.html">Advanced Exploit Development Dojo</a>.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXuHkqwADpsuuox5xtCSSo61HCxUVM6zjZ3-RDjZ56cLzVEFF22rjgGSOIlFpzp45Fqv08qIvxLAvgnrB0Zl6t8WWyHJ3Q5-XQYcN1H2DqOay-JP8r9tkE9v18uWWPNc8HU80COXKKSySG/s1600/vmware_logo.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXuHkqwADpsuuox5xtCSSo61HCxUVM6zjZ3-RDjZ56cLzVEFF22rjgGSOIlFpzp45Fqv08qIvxLAvgnrB0Zl6t8WWyHJ3Q5-XQYcN1H2DqOay-JP8r9tkE9v18uWWPNc8HU80COXKKSySG/s1600/vmware_logo.png" height="45" width="200" /></a></div>
Those of you who have already registered for CanSecWest's dojos, contact the organizers at secwest14 [at] cansecwest.com to reserve your free VMware licenses.The Exploit Laboratoryhttp://www.blogger.com/profile/11328081570343134323[email protected]0tag:blogger.com,1999:blog-2851662314069024595.post-2848635066060808192014-02-11T22:10:00.002+05:302014-02-11T22:10:50.719+05:30Exploit Lab Announcements for 2014 - CanSecWest and SyScan2013 witnessed many radical changes, and exploit development is no exception. We have been hard at work these past two months making heavy changes to the classes. Based on the positive feedback we received at the Blackhat West Coast Trainings in December, we have made significant updates to the Exploit Laboratory classes for 2014.<br />
<br />
Our 2014 line-up begins with two classes at CanSecWest, happening less than a month from now in Vancouver.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhiPQjhewAiXLKeOAL4Vv0VkF_bZg79G2QFfvV9wDKUGQ5yARd2-CCwE4Dg1xs_3HV4FH1AY3YwAFuVDeslFPmnz5uEHK00zbTKVaVzfZ2yUUTqZrUYhqNazuEeWXomHKJclQpqydKZQEOU/s1600/cansecwest.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhiPQjhewAiXLKeOAL4Vv0VkF_bZg79G2QFfvV9wDKUGQ5yARd2-CCwE4Dg1xs_3HV4FH1AY3YwAFuVDeslFPmnz5uEHK00zbTKVaVzfZ2yUUTqZrUYhqNazuEeWXomHKJclQpqydKZQEOU/s1600/cansecwest.png" /></a></div>
March 8,9: <a href="https://cansecwest.com/dojos/2014/intro_exploit_lab.html">The Exploit Laboratory Introductory Dojo</a><br />
March 10,11: <a href="https://cansecwest.com/dojos/2014/adv_exploit_lab.html">The Advanced Exploit Lab Dojo</a><br />
<br />
CanSecWest Dojos are unique. Small group and a very flexible environment to innovate and improvise as need be, followed by a high energy, high enthusiasm conference. And this year, we have a special guest instructor, Eric Liu, who shall be showing off some really fancy pure ASLR and DEP bypasses brought about from Use-After-Free bugs.<br />
<br />
As with last year, we have a combo offering for those who wish to take both classes for a <a href="https://cansecwest.com/register/course/exploit_combo">4-day 0 to PWN overdose of exploit development experience</a>! As usual, seats at the CanSecWest Dojos are limited, so make sure you register soon!<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjod5RlMPZtLgVcimpd0-0jzCM6W3dTCfPjgt-H59mVdx1I2BeVLWSeBW_SIyBdM5s_8vn9nx6572Zwyb_e6EfTff-a01yfYCuXDhN_HOYDEwx4E2DXE4PufwO-xzCS360UFoH1ExapcPVC/s1600/syscan14.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjod5RlMPZtLgVcimpd0-0jzCM6W3dTCfPjgt-H59mVdx1I2BeVLWSeBW_SIyBdM5s_8vn9nx6572Zwyb_e6EfTff-a01yfYCuXDhN_HOYDEwx4E2DXE4PufwO-xzCS360UFoH1ExapcPVC/s1600/syscan14.jpg" /></a></div>
The next class for March is at the SyScan 2014 conference in Singapore. At SyScan, we shall be offering a special 3 day exploit development class featuring intermediate and advanced exploit development techniques.<br />
<br />
March 31-April 2: <a href="http://syscan.org/index.php/sg/training/details/sys_14_07">The Exploit Laboratory SyScan '14 Edition</a><br />
<br />
SyScan 2014 is also featuring an epic line up of world class speakers and talks. Be sure not to miss it!<br />
<br />
For those of you have taken the Exploit Laboratory classes before, stay tuned for more announcements regarding really advanced content - more advanced than "Advanced". Tell your friends, spread the word, and pop by the conference to say, or have a <a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiwAKRzTuIeKuXc5zFF5fGluUdDqplMlZPcJ791OsudSPj3l5k-kne7QAkT5szhaH5zS3JXvkqu1Zdqt9kL8xCYNedU6CQo8vLqESNhMq5r0IWE2YDqm8ktXLi1BzEXCruWMe43R95t7M7i/s1600/poppopret_syscan.jpg">POP/POP/RET</a> with us!<br />
<br />
-- <a href="https://twitter.com/therealsaumil">Saumil Shah</a>The Exploit Laboratoryhttp://www.blogger.com/profile/11328081570343134323[email protected]0tag:blogger.com,1999:blog-2851662314069024595.post-47250609267298924582013-09-29T21:59:00.001+05:302013-10-03T04:16:20.506+05:30Wrapping up 2013: 4 days of Exploit Laboratory in Seattle<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgb8jcofQOkIVMcO7LL1OCpwpSHiEnVI42iKogWmUhEvabTnnks-U0NaXhTYSCg0KQ3nXli-zTvL9Z3aSuqLvxpK9PALTm6wEH7LiQE3Xf-FxTSXA1l5RBkGq0awuSxaooPVWoeNvMkIIG-/s1600/bh_seattle.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="192" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgb8jcofQOkIVMcO7LL1OCpwpSHiEnVI42iKogWmUhEvabTnnks-U0NaXhTYSCg0KQ3nXli-zTvL9Z3aSuqLvxpK9PALTm6wEH7LiQE3Xf-FxTSXA1l5RBkGq0awuSxaooPVWoeNvMkIIG-/s320/bh_seattle.png" width="320"></a></div>
Exploit Development has seen many changes in the past two years. It is time to raise the bar and offer new training to meet the challenges that lie ahead in 2014. After introducing new advanced material at 44CON, we are taking a little breather to prepare for two entirely new courses set to debut at the Blackhat West Coast Trainings in Seattle from December 9-12, 2013.<br>
<br>
We shall follow a slightly different pedagogy for the two courses. We shall focus more on learning through exercises and solving complex challenges.<br>
<br>
First, we introduce our new "<a href="https://www.blackhat.com/wc-13/training/The-Exploit-Laboratory-Red-Team.html"><b>Exploit Laboratory: Red Team</b></a>" class. This one is an intermediate/advanced level class covering modern day exploit development concepts - <b>vtable overwrites, Use-After-Free bugs, Return Oriented Programming, Advanced Heap Spraying for browsers and PDF readers</b>. The content is modeled after some of our advanced courses that we have taught in the past, except that this one has brand new exploits and a capture-the-flag round where you get to play against other teams, solving challenges on the fly. The CTF round requires you to modify tools and scripts to make things work.<br>
<br>
Our second course is brand new. "<a href="https://www.blackhat.com/wc-13/training/The-Exploit-Laboratory-Master.html"><b>Exploit Laboratory: Master</b></a>" continues where the Red Team class leaves off. The Master class consists largely of hands-on exercises. After teaching many advanced classes, a common feedback note is that there isn't enough time for more exercises. The Master class features a number of progressively complex and challenging exploit development exercises. In addition to this, we shall introduce new topics for the first time - <b>exploiting 64-bit applications, server side heap spraying, ROP chains for Linux and advanced compound exploits</b>.<br>
<br>
The Master class is designed to be an ideal extension of the Red Team class. <b>The two courses are designed to be taken back-to-back in a 4 day format</b>. Also, the Master class can be taken independently by anyone who has attended any of our Exploit Laboratory classes and want to sharpen their skills further.<br>
<br>
We are excited to bring you these new classes. Putting together advanced training material is always fun, and it is as much of a learning exercise for us as it is for students taking the class. We shall be putting up new tutorials to prepare for these classes in the next few weeks.<br>
<br>
-- Saumil Shah<br>
<a href="http://twitter.com/therealsaumil">@therealsaumil</a>The Exploit Laboratoryhttp://www.blogger.com/profile/11328081570343134323[email protected]0tag:blogger.com,1999:blog-2851662314069024595.post-63101246542737547822013-08-23T17:33:00.001+05:302013-08-23T17:46:06.647+05:30EIP = 0x44444444: The Exploit Laboratory goes to 44CON!<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3Ww-w8h1tDfxrgcAlzjuWbMr2osvmgrIy-W0QvDvlOHQckCWGEaE9nTemEG9gCG7vS4BCA1LVT3Lar4S8M5wh_lFENJPsY6OTeLMMsQt7NtjHJ8wytv7grtWOwanYRdJkfKrokqi4_1xN/s1600/logo.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3Ww-w8h1tDfxrgcAlzjuWbMr2osvmgrIy-W0QvDvlOHQckCWGEaE9nTemEG9gCG7vS4BCA1LVT3Lar4S8M5wh_lFENJPsY6OTeLMMsQt7NtjHJ8wytv7grtWOwanYRdJkfKrokqi4_1xN/s1600/logo.png" /></a>Thanks to the wonderful support from 44CON, The Exploit Laboratory finally arrives in London! We have a 2 day advanced class featuring topics such as vtable pointer overwrites, Use-After-Free bugs, defeating DEP using Return Oriented Programming, ASLR bypass and an introduction to exploit development on Android.<br />
<div>
<br /></div>
<div>
Click here for the <a href="http://44con.com/training/the-advanced-exploit-laboratory.html">class description and registration</a>.<br />
<div>
<br /></div>
<div>
<div>
This is a compact class and is filling up quite fast. We shall be sending out preparation emails to currently registered students in a week's time.</div>
</div>
</div>
<div>
<br /></div>
<div>
See you soon in London!<br />
<br />
-- Saumil Shah, <a href="https://twitter.com/therealsaumil">@therealsaumil</a><br />
<br /></div>
<iframe width="560" height="315" src="//www.youtube.com/embed/291kT7LvQ0k?rel=0&showinfo=0" frameborder="0"></iframe>The Exploit Laboratoryhttp://www.blogger.com/profile/11328081570343134323[email protected]0tag:blogger.com,1999:blog-2851662314069024595.post-43651806804049164102013-06-13T04:43:00.002+05:302013-06-13T04:43:37.165+05:30A New Tutorial: Dive Into ROP - Blackhat USA 2013<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUG8tMbGIu4wJJAYdgRaI_nr1DRHbJ-NNxR6bBnW-qqv9R95diEjpHU45lgXr-hZAxAl5FNEq0S3zjZGe0R1QomlUSd9aL9Mr7YplB0IT8_ezvLMt_1RBBG-0rWLSagbpskK6EvJecC-iq/s1600/us-13.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUG8tMbGIu4wJJAYdgRaI_nr1DRHbJ-NNxR6bBnW-qqv9R95diEjpHU45lgXr-hZAxAl5FNEq0S3zjZGe0R1QomlUSd9aL9Mr7YplB0IT8_ezvLMt_1RBBG-0rWLSagbpskK6EvJecC-iq/s1600/us-13.png" /></a></div>
Our classes at Blackhat USA 2013 are rapidly filling up. We have a new tutorial for students taking <a href="https://www.blackhat.com/us-13/training/the-exploit-laboratory-black-belt-edition.html" target="_blank">The Exploit Laboratory: Black Belt Edition</a>.<br />
<br />
"Dive Into ROP" is a quick look at the core concepts behind Return Oriented Programming. This tutorial is not an essential pre-requisite for our advanced exploit development class, however it would be a good idea to study Ret2LibC before attending Black Belt Edition class.<br />
<div>
<br /></div>
<div>
Students taking the <a href="https://www.blackhat.com/us-13/training/the-exploit-laboratory.html" target="_blank">weekend Exploit Laboratory class</a> can also sign up for the weekday advanced Black Belt edition class as a 4-day combo package. We guarantee you won't be disappointed! Meanwhile, here is "Dive Into ROP":<br />
<br />
<br /></div>
<iframe src="http://www.slideshare.net/slideshow/embed_code/22878988?rel=0" width="427" height="356" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" style="border:1px solid #CCC;border-width:1px 1px 0;margin-bottom:5px" allowfullscreen webkitallowfullscreen mozallowfullscreen> </iframe> <div style="margin-bottom:5px"> <strong> <a href="http://www.slideshare.net/saumilshah/dive-into-rop-a-quick-introduction-to-return-oriented-programming" title="Dive into ROP - a quick introduction to Return Oriented Programming" target="_blank">Dive into ROP - a quick introduction to Return Oriented Programming</a> </strong> from <strong><a href="http://www.slideshare.net/saumilshah" target="_blank">Saumil Shah</a></strong> </div>
<div>
<br />
And here are some more <a href="http://blog.exploitlab.net/2013/05/students-get-ready-for-blackhat-usa-2013.html" target="_blank">Exploit Laboratory Tutorials</a>.</div>The Exploit Laboratoryhttp://www.blogger.com/profile/11328081570343134323[email protected]0tag:blogger.com,1999:blog-2851662314069024595.post-72906299555201970582013-05-24T18:30:00.000+05:302013-05-24T18:30:14.398+05:30ALL NEW! Exploit Laboratory at Blackhat USA 2013<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUG8tMbGIu4wJJAYdgRaI_nr1DRHbJ-NNxR6bBnW-qqv9R95diEjpHU45lgXr-hZAxAl5FNEq0S3zjZGe0R1QomlUSd9aL9Mr7YplB0IT8_ezvLMt_1RBBG-0rWLSagbpskK6EvJecC-iq/s1600/us-13.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUG8tMbGIu4wJJAYdgRaI_nr1DRHbJ-NNxR6bBnW-qqv9R95diEjpHU45lgXr-hZAxAl5FNEq0S3zjZGe0R1QomlUSd9aL9Mr7YplB0IT8_ezvLMt_1RBBG-0rWLSagbpskK6EvJecC-iq/s1600/us-13.png" /></a></div>
Blackhat 2013 is approaching. We have been hard at work overhauling The Exploit Laboratory and Exploit Laboratory: Black Belt classes. This year shall see a 100% overhaul of the course contents for both classes.<br />
<br />
With feedback and observations from 6 years and over 40 classes taught worldwide, we have decided to give the classes a complete makeover.<br />
<br />
A glimpse of what's new:<br />
<br />
ALL NEW EXPLOITS! We are stepping up the game. Special focus shall be given to browser exploits in addition to memory corruption on databases, libraries and web servers.<br />
<br />
USE-AFTER-FREE - New material, new methodology, heap tracing madness, in-depth exploitation.<br />
<br />
NEW PEDAGOGY - In addition to our much appreciated hands-on style, we shall be handing out "after dark" exercises, meant for those who love to be on the leading edge. These are exercises to challenge your creating and pwnage skills. Those who complete the exercises shall get a special bonus.<br />
<br />
ROP, ROP, ROP - Can't say it often enough. Return Oriented Programming is an essential skill required for an exploit to work these days. We have new ROP examples and new ROP recipes. We have "Dynamic ROP", the stuff used for Pwn2Own style exploits. And more.<br />
<br />
BlackHat's regular pricing ends on May 31. Do keep in mind that <a href="https://www.blackhat.com/us-13/training/the-exploit-laboratory.html" target="_blank">The Exploit Laboratory</a> and <a href="https://www.blackhat.com/us-13/training/the-exploit-laboratory-black-belt-edition.html" target="_blank">Exploit Laboratory: Black Belt</a> can be combined into one 4-day mega exploit development fiesta.<br />
<br />
Last but not least, new additions to our crew! Josh Michaels joins our crew along with my other awesome co-stars - S K and Josh Ryder. We promise a great 4 days of training, with 2013 being my 15th consecutive appearance at BlackHat.The Exploit Laboratoryhttp://www.blogger.com/profile/11328081570343134323[email protected]0tag:blogger.com,1999:blog-2851662314069024595.post-38665872962454125032013-05-24T05:06:00.000+05:302013-05-24T05:06:09.182+05:30Students, Get Ready for Blackhat USA 2013!<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUG8tMbGIu4wJJAYdgRaI_nr1DRHbJ-NNxR6bBnW-qqv9R95diEjpHU45lgXr-hZAxAl5FNEq0S3zjZGe0R1QomlUSd9aL9Mr7YplB0IT8_ezvLMt_1RBBG-0rWLSagbpskK6EvJecC-iq/s1600/us-13.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="96" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUG8tMbGIu4wJJAYdgRaI_nr1DRHbJ-NNxR6bBnW-qqv9R95diEjpHU45lgXr-hZAxAl5FNEq0S3zjZGe0R1QomlUSd9aL9Mr7YplB0IT8_ezvLMt_1RBBG-0rWLSagbpskK6EvJecC-iq/s200/us-13.png" width="200" /></a></div>
It is the calm before the storm. BlackHat USA 2013 is drawing near and The Exploit Laboratory classes are filling up fast. This blog post is for students who have already registered for the classes. We would like you to brush up on some core concepts before the class, giving you sufficient time to prepare and ask us questions before the exploit development festival begins in Las Vegas!<br />
<br />
As a refresher, we have three tutorials for you:<br />
<br />
Operating Systems: A Primer<br />
<iframe allowfullscreen="" frameborder="0" height="356" marginheight="0" marginwidth="0" mozallowfullscreen="" scrolling="no" src="http://www.slideshare.net/slideshow/embed_code/7796273?rel=0" style="border-width: 1px 1px 0; border: 1px solid #CCC; margin-bottom: 5px;" webkitallowfullscreen="" width="427"> </iframe> <br />
<div style="margin-bottom: 5px;">
<strong> <a href="http://www.slideshare.net/saumilshah/operating-systems-a-primer" target="_blank" title="Operating Systems - A Primer">Operating Systems - A Primer</a> </strong> from <strong><a href="http://www.slideshare.net/saumilshah" target="_blank">Saumil Shah</a></strong> </div>
<br />
<br />
How Functions Work<br />
<iframe allowfullscreen="" frameborder="0" height="356" marginheight="0" marginwidth="0" mozallowfullscreen="" scrolling="no" src="http://www.slideshare.net/slideshow/embed_code/7776073?rel=0" style="border-width: 1px 1px 0; border: 1px solid #CCC; margin-bottom: 5px;" webkitallowfullscreen="" width="427"> </iframe> <br />
<div style="margin-bottom: 5px;">
<strong> <a href="http://www.slideshare.net/saumilshah/how-functions-work-7776073" target="_blank" title="How Functions Work">How Functions Work</a> </strong> from <strong><a href="http://www.slideshare.net/saumilshah" target="_blank">Saumil Shah</a></strong> </div>
<br />
<br />
Introduction to Debuggers<br />
<iframe allowfullscreen="" frameborder="0" height="356" marginheight="0" marginwidth="0" mozallowfullscreen="" scrolling="no" src="http://www.slideshare.net/slideshow/embed_code/7899250?rel=0" style="border-width: 1px 1px 0; border: 1px solid #CCC; margin-bottom: 5px;" webkitallowfullscreen="" width="427"> </iframe> <br />
<div style="margin-bottom: 5px;">
<strong> <a href="http://www.slideshare.net/saumilshah/introduction-to-debuggers" target="_blank" title="Introduction to Debuggers">Introduction to Debuggers</a> </strong> from <strong><a href="http://www.slideshare.net/saumilshah" target="_blank">Saumil Shah</a></strong> </div>
<br />
<a href="https://www.blackhat.com/us-13/training/the-exploit-laboratory.html" target="_blank">The Exploit Laboratory</a> and <a href="https://www.blackhat.com/us-13/training/the-exploit-laboratory-black-belt-edition.html" target="_blank">Exploit Laboratory: Black Belt</a> are fast paced classes. We want you to ensure that you maximize your learning and pwnage experience and walk away with lots of evil smiles and shells! Next month, we shall be posting new tutorials, so stay tuned!The Exploit Laboratoryhttp://www.blogger.com/profile/11328081570343134323[email protected]0