UsefulLinks
Computer Science
Other Tools and Technologies
Hardware Hacking
1. Introduction to Hardware Hacking
2. Foundational Electronics Knowledge
3. Laboratory Setup and Safety
4. Hardware Hacking Toolkit
5. Target Device Reconnaissance
6. Communication Interface Analysis
7. Memory Analysis and Extraction
8. Firmware Analysis Methodologies
9. Reverse Engineering Techniques
10. Vulnerability Discovery and Exploitation
11. Advanced Attack Techniques
12. Firmware Modification and Patching
13. Defensive Countermeasures
10.
Vulnerability Discovery and Exploitation
10.1.
Common Vulnerability Classes
10.1.1.
Memory Corruption Vulnerabilities
10.1.1.1.
Buffer Overflows
10.1.1.2.
Stack-Based Overflows
10.1.1.3.
Heap-Based Overflows
10.1.1.4.
Integer Overflows
10.1.1.5.
Format String Vulnerabilities
10.1.2.
Logic Vulnerabilities
10.1.2.1.
Authentication Bypasses
10.1.2.2.
Authorization Flaws
10.1.2.3.
Race Conditions
10.1.2.4.
Time-of-Check-Time-of-Use
10.1.3.
Cryptographic Vulnerabilities
10.1.3.1.
Weak Key Generation
10.1.3.2.
Poor Key Management
10.1.3.3.
Implementation Flaws
10.1.3.4.
Protocol Weaknesses
10.1.4.
Input Validation Vulnerabilities
10.1.4.1.
Command Injection
10.1.4.2.
SQL Injection
10.1.4.3.
Path Traversal
10.1.4.4.
XML External Entity
10.2.
Exploitation Techniques
10.2.1.
Return-Oriented Programming
10.2.1.1.
Gadget Discovery
10.2.1.2.
Chain Construction
10.2.1.3.
Payload Development
10.2.2.
Jump-Oriented Programming
10.2.2.1.
Dispatcher Gadgets
10.2.2.2.
Functional Gadgets
10.2.2.3.
Chain Execution
10.2.3.
Heap Exploitation
10.2.3.1.
Heap Spray Techniques
10.2.3.2.
Use-After-Free Exploitation
10.2.3.3.
Double-Free Exploitation
10.2.4.
Format String Exploitation
10.2.4.1.
Memory Read Techniques
10.2.4.2.
Memory Write Techniques
10.2.4.3.
Control Flow Hijacking
10.3.
Exploit Development Process
10.3.1.
Vulnerability Analysis
10.3.1.1.
Root Cause Analysis
10.3.1.2.
Exploitability Assessment
10.3.1.3.
Impact Evaluation
10.3.2.
Proof-of-Concept Development
10.3.2.1.
Minimal Exploit Creation
10.3.2.2.
Reliability Testing
10.3.2.3.
Payload Optimization
10.3.3.
Exploit Hardening
10.3.3.1.
ASLR Bypass Techniques
10.3.3.2.
DEP/NX Bypass Methods
10.3.3.3.
Stack Canary Bypass
10.4.
Post-Exploitation Techniques
10.4.1.
Persistence Mechanisms
10.4.1.1.
Firmware Modification
10.4.1.2.
Configuration Changes
10.4.1.3.
Backdoor Installation
10.4.2.
Privilege Escalation
10.4.2.1.
Kernel Exploitation
10.4.2.2.
Driver Vulnerabilities
10.4.2.3.
Configuration Weaknesses
10.4.3.
Data Exfiltration
10.4.3.1.
Covert Channels
10.4.3.2.
Network Exfiltration
10.4.3.3.
Physical Exfiltration
Previous
9. Reverse Engineering Techniques
Go to top
Next
11. Advanced Attack Techniques