<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://security.cs.pub.ro/summer-school/wiki/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="https://security.cs.pub.ro/summer-school/wiki/feed.php">
        <title>Security Summer School - session:extra</title>
        <description></description>
        <link>https://security.cs.pub.ro/summer-school/wiki/</link>
        <image rdf:resource="https://security.cs.pub.ro/summer-school/wiki/_media/wiki/dokuwiki.svg" />
       <dc:date>2026-04-24T12:55:59+00:00</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="https://security.cs.pub.ro/summer-school/wiki/session/extra/advanced-attacks?rev=1595152140&amp;do=diff"/>
                <rdf:li rdf:resource="https://security.cs.pub.ro/summer-school/wiki/session/extra/fuzzing?rev=1595152140&amp;do=diff"/>
                <rdf:li rdf:resource="https://security.cs.pub.ro/summer-school/wiki/session/extra/heartbleed-poc?rev=1595152140&amp;do=diff"/>
                <rdf:li rdf:resource="https://security.cs.pub.ro/summer-school/wiki/session/extra/preventing-vulnerabilities?rev=1595152140&amp;do=diff"/>
                <rdf:li rdf:resource="https://security.cs.pub.ro/summer-school/wiki/session/extra/start?rev=1595152140&amp;do=diff"/>
                <rdf:li rdf:resource="https://security.cs.pub.ro/summer-school/wiki/session/extra/stateful-fuzzing?rev=1595152140&amp;do=diff"/>
                <rdf:li rdf:resource="https://security.cs.pub.ro/summer-school/wiki/session/extra/stateless-fuzzing?rev=1595152140&amp;do=diff"/>
                <rdf:li rdf:resource="https://security.cs.pub.ro/summer-school/wiki/session/extra/windows-security?rev=1595152140&amp;do=diff"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="https://security.cs.pub.ro/summer-school/wiki/_media/wiki/dokuwiki.svg">
        <title>Security Summer School</title>
        <link>https://security.cs.pub.ro/summer-school/wiki/</link>
        <url>https://security.cs.pub.ro/summer-school/wiki/_media/wiki/dokuwiki.svg</url>
    </image>
    <item rdf:about="https://security.cs.pub.ro/summer-school/wiki/session/extra/advanced-attacks?rev=1595152140&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-07-19T09:49:00+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>0x0E. Topics on Advanced Attacks</title>
        <link>https://security.cs.pub.ro/summer-school/wiki/session/extra/advanced-attacks?rev=1595152140&amp;do=diff</link>
        <description>0x0E. Topics on Advanced Attacks

Slides



Tutorials

Install angr. See &lt;http://angr.io/install.html&gt;

Download 

Switch to task-0 and first analyze the binary manually (IDA, gdb, etc). Then analyze the Angr solver: where the state starts, the avoided branches and the target state. Check that it works as expected.</description>
    </item>
    <item rdf:about="https://security.cs.pub.ro/summer-school/wiki/session/extra/fuzzing?rev=1595152140&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-07-19T09:49:00+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>0x0C. Fuzzing</title>
        <link>https://security.cs.pub.ro/summer-school/wiki/session/extra/fuzzing?rev=1595152140&amp;do=diff</link>
        <description>0x0C. Fuzzing

Slides

Slides are available [here].

Tutorials

Introduction

Fuzzing is a technique for testing certain kinds of software by feeding the target with thousands of random generated inputs. From now on, the target is the software program that we test using the fuzzer. Fuzzing is used by companies to test their internal developed software, or by security companies to analyze interesting pieces of software(delivered as binaries).</description>
    </item>
    <item rdf:about="https://security.cs.pub.ro/summer-school/wiki/session/extra/heartbleed-poc?rev=1595152140&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-07-19T09:49:00+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>0x0Cb. Heartbleed Proof of Concept</title>
        <link>https://security.cs.pub.ro/summer-school/wiki/session/extra/heartbleed-poc?rev=1595152140&amp;do=diff</link>
        <description>0x0Cb. Heartbleed Proof of Concept

Information Leak

In the context of binary exploitation, information leakage attacks are based on bugs such as integers overflows, or unchecked bounds, and can be used to leak the memory contents of a process. Using this kind of attack we can overcome some protection mechanism that we just studied. We could leak stack canaries and then use them to successfully overflow the stack, or we could leak addresses from the stack or other structures, thus defeating ASL…</description>
    </item>
    <item rdf:about="https://security.cs.pub.ro/summer-school/wiki/session/extra/preventing-vulnerabilities?rev=1595152140&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-07-19T09:49:00+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>0x0D. Preventing Vulnerabilities</title>
        <link>https://security.cs.pub.ro/summer-school/wiki/session/extra/preventing-vulnerabilities?rev=1595152140&amp;do=diff</link>
        <description>0x0D. Preventing Vulnerabilities

Slides

Tutorials

Sanitizing Input

Invalid input may cause a program to crash. Input may also consists of content that is able to exploit vulnerabilities in programs; among the most famous forms of input that causes exploits is</description>
    </item>
    <item rdf:about="https://security.cs.pub.ro/summer-school/wiki/session/extra/start?rev=1595152140&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-07-19T09:49:00+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>Extra</title>
        <link>https://security.cs.pub.ro/summer-school/wiki/session/extra/start?rev=1595152140&amp;do=diff</link>
        <description>Extra
extra index</description>
    </item>
    <item rdf:about="https://security.cs.pub.ro/summer-school/wiki/session/extra/stateful-fuzzing?rev=1595152140&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-07-19T09:49:00+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>0x07b. Stateful Fuzzing</title>
        <link>https://security.cs.pub.ro/summer-school/wiki/session/extra/stateful-fuzzing?rev=1595152140&amp;do=diff</link>
        <description>0x07b. Stateful Fuzzing

Slides

The slides ca be found over [here]

Tutorials

Stateful Fuzzing

When doing stateful fuzzing, our protocol message requests aren&#039;t independent any more from one another and must be sent in a specific order so as to carry out the fuzzing process. This type of ordering leads to a natural representation of the state machine as a graph with message requests being represented as nodes and sequencing between messages as edges.</description>
    </item>
    <item rdf:about="https://security.cs.pub.ro/summer-school/wiki/session/extra/stateless-fuzzing?rev=1595152140&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-07-19T09:49:00+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>0x07. Stateless Fuzzing</title>
        <link>https://security.cs.pub.ro/summer-school/wiki/session/extra/stateless-fuzzing?rev=1595152140&amp;do=diff</link>
        <description>0x07. Stateless Fuzzing

Slides

The slides can be found [here].

Tutorials

“To fuzz or not to fuzz ?”

Fuzzing is a software testing technique, often automated, that involves providing invalid, unexpected or random data as input to a program. From a security perspective, it&#039;s imperative for discovering new software vulnerabilities in applications where you don&#039;t have access to the underlying source code and even in applications where you do have the source code. The phases of the fuzzing proce…</description>
    </item>
    <item rdf:about="https://security.cs.pub.ro/summer-school/wiki/session/extra/windows-security?rev=1595152140&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-07-19T09:49:00+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>Extra: Windows Security Mechanics</title>
        <link>https://security.cs.pub.ro/summer-school/wiki/session/extra/windows-security?rev=1595152140&amp;do=diff</link>
        <description>Extra: Windows Security Mechanics

Slides

You can find the slides [here.]

Tutorials

This session will provide a quick intro into Windows Land. We will first explore the windows PE (Portable Executable) file format. On key elements we will try and present the differences between it and what</description>
    </item>
</rdf:RDF>
