- Introduction
- 1. CSSE 140
- 2. CSSE 141
❱
- 2.1. Week 1
- 2.2. Week 2
❱
- 2.2.1. tar
- 2.2.2. UNIX Passwords
- 2.2.3. Hashing
- 2.2.4. Word Lists
- 2.2.5. Cracking Hashed Passwords
- 2.3. Week 3
❱
- 2.3.1. RFC 1918 Networks
- 2.3.2. OpenVPN Connection
- 3. CSSE 142
❱
- 3.1. Fundamentals
❱
- 3.1.1. Character Encoding
- 3.1.2. Base64 Encoding
- 3.1.3. HTTP Basic Authentication
- 3.1.4. Endianness
- 3.1.5. Handling bytes in Python
- 3.1.6. Python XOR
- 3.2. Passwords
❱
- 3.2.1. Password cracking
- 3.3. Binary Exploits
❱
- 3.3.1. Crafting Exploit Strings
- 3.3.2. Buffer Overflows
- 3.3.3. Stack Organization
- 3.3.4. Quick Disassembly
- 3.3.5. Format String Exploit
- 3.4. Injections
❱
- 3.4.1. SQL Injections
- 3.4.2. Template Injections
- 3.5. C2 and Kali
❱
- 3.5.1. C2 and Kali part 2
- 4. Tools
❱
- 4.1. Virtual Machines
❱
- 4.1.1. Hypervisors
- 4.1.2. Installing VMware
- 4.1.3. Snapshots
- 4.2. Kali Linux
❱
- 4.2.1. Installing Kali on VMware
- 4.2.2. Updating Kali
- 4.2.3. Kali first look
- 4.2.4. Kali Build Tools
- 4.2.5. kali-tweaks
- 4.2.6. SSH into Kali
- 4.3. Ghidra
❱
- 4.3.1. Ghidra Issues?
- 4.4. Cyberchef
❱
- 4.4.1. Cyberchef example 1
- 4.4.2. Cyberchef example 2
- 4.5. Python
❱
- 4.5.1. Interactive Python
- 4.5.2. Extending Colab
- 4.5.3. Single Line Scripts
- 4.5.4. Quick Webserver
- 4.6. VPNs
- 4.7. Template VMs