Useful Links
Computer Science
Other Tools and Technologies
Hardware Hacking
1. Introduction to Hardware Hacking
2. Foundational Electronics Knowledge
3. Laboratory Setup and Safety
4. Hardware Hacking Toolkit
5. Target Device Reconnaissance
6. Communication Interface Analysis
7. Memory Analysis and Extraction
8. Firmware Analysis Methodologies
9. Reverse Engineering Techniques
10. Vulnerability Discovery and Exploitation
11. Advanced Attack Techniques
12. Firmware Modification and Patching
13. Defensive Countermeasures
Vulnerability Discovery and Exploitation
Common Vulnerability Classes
Memory Corruption Vulnerabilities
Buffer Overflows
Stack-Based Overflows
Heap-Based Overflows
Integer Overflows
Format String Vulnerabilities
Logic Vulnerabilities
Authentication Bypasses
Authorization Flaws
Race Conditions
Time-of-Check-Time-of-Use
Cryptographic Vulnerabilities
Weak Key Generation
Poor Key Management
Implementation Flaws
Protocol Weaknesses
Input Validation Vulnerabilities
Command Injection
SQL Injection
Path Traversal
XML External Entity
Exploitation Techniques
Return-Oriented Programming
Gadget Discovery
Chain Construction
Payload Development
Jump-Oriented Programming
Dispatcher Gadgets
Functional Gadgets
Chain Execution
Heap Exploitation
Heap Spray Techniques
Use-After-Free Exploitation
Double-Free Exploitation
Format String Exploitation
Memory Read Techniques
Memory Write Techniques
Control Flow Hijacking
Exploit Development Process
Vulnerability Analysis
Root Cause Analysis
Exploitability Assessment
Impact Evaluation
Proof-of-Concept Development
Minimal Exploit Creation
Reliability Testing
Payload Optimization
Exploit Hardening
ASLR Bypass Techniques
DEP/NX Bypass Methods
Stack Canary Bypass
Post-Exploitation Techniques
Persistence Mechanisms
Firmware Modification
Configuration Changes
Backdoor Installation
Privilege Escalation
Kernel Exploitation
Driver Vulnerabilities
Configuration Weaknesses
Data Exfiltration
Covert Channels
Network Exfiltration
Physical Exfiltration
Previous
9. Reverse Engineering Techniques
Go to top
Next
11. Advanced Attack Techniques