| VIDEOS EXP-301/0.EXP301-COPY_00_00-Copyright.mp4 |
995 KB |
| VIDEOS EXP-301/1.EXP301-WINDBG_00_00-WinDbg and x86 Architecture.mp4 |
789 KB |
| VIDEOS EXP-301/10.EXP301-WINDBG_03_00-Accessing and Manipulating Memory from WinDbg.mp4 |
770 KB |
| VIDEOS EXP-301/100.EXP301-SHELL_05_02-Position-Independent Shellcode.mp4 |
17 MB |
| VIDEOS EXP-301/101.EXP301-SHELL_06_00-Reverse Shell.mp4 |
2.6 MB |
| VIDEOS EXP-301/102.EXP301-SHELL_06_01-Loading ws2_32.dll and Resolving Symbols.mp4 |
15.8 MB |
| VIDEOS EXP-301/103.EXP301-SHELL_06_02-Calling WSAStartup.mp4 |
18 MB |
| VIDEOS EXP-301/104.EXP301-SHELL_06_03-Calling WSASocket.mp4 |
14.3 MB |
| VIDEOS EXP-301/105.EXP301-SHELL_06_04-Calling WSAConnect.mp4 |
22.9 MB |
| VIDEOS EXP-301/106.EXP301-SHELL_06_05-Calling CreateProcessA.mp4 |
25.7 MB |
| VIDEOS EXP-301/107.EXP301-SHELL_07_00-Wrapping Up.mp4 |
1.2 MB |
| VIDEOS EXP-301/108.EXP301-REV_00_00-Reverse Engineering for Bugs.mp4 |
4.7 MB |
| VIDEOS EXP-301/109.EXP301-REV_01_00-Installation and Enumeration.mp4 |
1 MB |
| VIDEOS EXP-301/11.EXP301-WINDBG_03_01-Unassemble from Memory.mp4 |
3.1 MB |
| VIDEOS EXP-301/110.EXP301-REV_01_01-Installing Tivoli Storage Manager.mp4 |
5.4 MB |
| VIDEOS EXP-301/111.EXP301-REV_01_02-Enumerating an Application.mp4 |
9.5 MB |
| VIDEOS EXP-301/112.EXP301-REV_02_00-Interacting with Tivoli Storage Manager.mp4 |
3.1 MB |
| VIDEOS EXP-301/113.EXP301-REV_02_01-Hooking the recv API.mp4 |
9.8 MB |
| VIDEOS EXP-301/114.EXP301-REV_02_02-Synchronizing WinDbg and IDA Pro.mp4 |
18.7 MB |
| VIDEOS EXP-301/115.EXP301-REV_02_03-Tracing the Input.mp4 |
9.8 MB |
| VIDEOS EXP-301/116.EXP301-REV_02_04-Checksum Please.mp4 |
89 MB |
| VIDEOS EXP-301/117.EXP301-REV_03_00-Reverse Engineering the Protocol.mp4 |
1.4 MB |
| VIDEOS EXP-301/118.EXP301-REV_03_01-Header-Data Separation.mp4 |
58.5 MB |
| VIDEOS EXP-301/119.EXP301-REV_03_02-Reversing the Header.mp4 |
54.7 MB |
| VIDEOS EXP-301/12.EXP301-WINDBG_03_02-Reading from Memory.mp4 |
5.2 MB |
| VIDEOS EXP-301/120.EXP301-REV_03_03-Exploiting Memcpy.mp4 |
24.7 MB |
| VIDEOS EXP-301/121.EXP301-REV_03_04-Getting EIP Control.mp4 |
17.1 MB |
| VIDEOS EXP-301/122.EXP301-REV_04_00-Digging Deeper to Find More Bugs.mp4 |
1.3 MB |
| VIDEOS EXP-301/123.EXP301-REV_04_01-Switching Execution.mp4 |
25.8 MB |
| VIDEOS EXP-301/124.EXP301-REV_04_02-Going Down 0x534.mp4 |
55.7 MB |
| VIDEOS EXP-301/125.EXP301-REV_05_00-Wrapping Up.mp4 |
965 KB |
| VIDEOS EXP-301/126.EXP301-DEP_00_00-Stack Overflows and DEP Bypass.mp4 |
1.5 MB |
| VIDEOS EXP-301/127.EXP301-DEP_01_00-Data Execution Prevention.mp4 |
1015 KB |
| VIDEOS EXP-301/128.EXP301-DEP_01_01-DEP Theory.mp4 |
12.4 MB |
| VIDEOS EXP-301/129.EXP301-DEP_01_02-Windows Defender Exploit Guard.mp4 |
17.8 MB |
| VIDEOS EXP-301/13.EXP301-WINDBG_03_03-Dumping Structures from Memory.mp4 |
9.7 MB |
| VIDEOS EXP-301/130.EXP301-DEP_02_00-Return Oriented Programming.mp4 |
1.8 MB |
| VIDEOS EXP-301/131.EXP301-DEP_02_01-Origins of Return Oriented Programming Exploitation.mp4 |
4 MB |
| VIDEOS EXP-301/132.EXP301-DEP_02_02-Return Oriented Programming Evolution.mp4 |
10.2 MB |
| VIDEOS EXP-301/133.EXP301-DEP_03_00-Gadget Selection.mp4 |
1.4 MB |
| VIDEOS EXP-301/134.EXP301-DEP_03_01-Debugger Automation Pykd.mp4 |
35.8 MB |
| VIDEOS EXP-301/135.EXP301-DEP_03_02-Optimized Gadget Discovery RP.mp4 |
7.6 MB |
| VIDEOS EXP-301/136.EXP301-DEP_04_00-Bypassing DEP.mp4 |
1.9 MB |
| VIDEOS EXP-301/137.EXP301-DEP_04_01-Getting The Offset.mp4 |
18.4 MB |
| VIDEOS EXP-301/138.EXP301-DEP_04_02-Locating Gadgets.mp4 |
8.5 MB |
| VIDEOS EXP-301/139.EXP301-DEP_04_03-Preparing the Battlefield.mp4 |
9.2 MB |
| VIDEOS EXP-301/14.EXP301-WINDBG_03_04-Writing to Memory.mp4 |
2.1 MB |
| VIDEOS EXP-301/140.EXP301-DEP_04_04-Making ROPs Acquaintance.mp4 |
15.6 MB |
| VIDEOS EXP-301/141.EXP301-DEP_04_05-Obtaining VirtualAlloc Address.mp4 |
51.5 MB |
| VIDEOS EXP-301/142.EXP301-DEP_04_06-Patching the Return Address.mp4 |
31 MB |
| VIDEOS EXP-301/143.EXP301-DEP_04_07-Patching Arguments.mp4 |
37.6 MB |
| VIDEOS EXP-301/144.EXP301-DEP_04_08-Executing VirtualAlloc.mp4 |
21.2 MB |
| VIDEOS EXP-301/145.EXP301-DEP_04_09-Getting a Reverse Shell.mp4 |
8.9 MB |
| VIDEOS EXP-301/146.EXP301-DEP_05_00-Wrapping Up.mp4 |
1.3 MB |
| VIDEOS EXP-301/147.EXP301-ASLR_00_00-Stack Overflows and ASLR Bypass.mp4 |
1.2 MB |
| VIDEOS EXP-301/148.EXP301-ASLR_01_00-ASLR Introduction.mp4 |
1 MB |
| VIDEOS EXP-301/149.EXP301-ASLR_01_01-ASLR Implementation.mp4 |
2.8 MB |
| VIDEOS EXP-301/15.EXP301-WINDBG_03_05-Searching the Memory Space.mp4 |
8.7 MB |
| VIDEOS EXP-301/150.EXP301-ASLR_01_02-ASLR Bypass Theory.mp4 |
9 MB |
| VIDEOS EXP-301/151.EXP301-ASLR_01_03-Windows Defender Exploit Guard and ASLR.mp4 |
11.9 MB |
| VIDEOS EXP-301/152.EXP301-ASLR_02_00-Finding Hidden Gems.mp4 |
1.8 MB |
| VIDEOS EXP-301/153.EXP301-ASLR_02_01-FXCLI_DebugDispatch.mp4 |
20.9 MB |
| VIDEOS EXP-301/154.EXP301-ASLR_02_02-Arbitrary Symbol Resolution.mp4 |
32.7 MB |
| VIDEOS EXP-301/155.EXP301-ASLR_02_03-Returning the Goods.mp4 |
49.8 MB |
| VIDEOS EXP-301/156.EXP301-ASLR_03_00-Expanding our Exploit (ASLR Bypass).mp4 |
1.5 MB |
| VIDEOS EXP-301/157.EXP301-ASLR_03_01-Leaking an IBM Module.mp4 |
13 MB |
| VIDEOS EXP-301/158.EXP301-ASLR_03_02-Is That a Bad Character.mp4 |
18 MB |
| VIDEOS EXP-301/159.EXP301-ASLR_04_00-Bypassing DEP with WriteProcessMemory.mp4 |
1.3 MB |
| VIDEOS EXP-301/16.EXP301-WINDBG_03_06-Inspecting and Editing CPU Registers in WinDbg.mp4 |
1.9 MB |
| VIDEOS EXP-301/160.EXP301-ASLR_04_01-WriteProcessMemory.mp4 |
55 MB |
| VIDEOS EXP-301/161.EXP301-ASLR_04_02-Getting Our Shell.mp4 |
24.4 MB |
| VIDEOS EXP-301/162.EXP301-ASLR_04_03-Handmade ROP Decoder.mp4 |
40.5 MB |
| VIDEOS EXP-301/163.EXP301-ASLR_04_04-Automating the Shellcode Encoding.mp4 |
5 MB |
| VIDEOS EXP-301/164.EXP301-ASLR_04_05-Automating the ROP Decoder.mp4 |
41.3 MB |
| VIDEOS EXP-301/165.EXP301-ASLR_05_00-Wrapping Up.mp4 |
1.4 MB |
| VIDEOS EXP-301/166.EXP301-FSSA1_00_00-Format String Specifier Attack Part I.mp4 |
1.8 MB |
| VIDEOS EXP-301/167.EXP301-FSSA1_01_00-Format String Attacks.mp4 |
500 KB |
| VIDEOS EXP-301/168.EXP301-FSSA1_01_01-Format String Theory.mp4 |
5.9 MB |
| VIDEOS EXP-301/169.EXP301-FSSA1_01_02-Exploiting Format String Specifiers.mp4 |
17.3 MB |
| VIDEOS EXP-301/17.EXP301-WINDBG_04_00-Controlling the Program Execution in WinDbg.mp4 |
1.3 MB |
| VIDEOS EXP-301/170.EXP301-FSSA1_02_00-Attacking IBM Tivoli FastBackServer.mp4 |
1.2 MB |
| VIDEOS EXP-301/171.EXP301-FSSA1_02_01-Investigating the EventLog Function.mp4 |
15.3 MB |
| VIDEOS EXP-301/172.EXP301-FSSA1_02_02-Reverse Engineering a Path.mp4 |
31.4 MB |
| VIDEOS EXP-301/173.EXP301-FSSA1_02_03-Invoke the Specifiers.mp4 |
20.4 MB |
| VIDEOS EXP-301/174.EXP301-FSSA1_03_00-Reading the Event Log.mp4 |
1.1 MB |
| VIDEOS EXP-301/175.EXP301-FSSA1_03_01-The Tivoli Event Log.mp4 |
25.1 MB |
| VIDEOS EXP-301/176.EXP301-FSSA1_03_02-Remote Event Log Service.mp4 |
36 MB |
| VIDEOS EXP-301/177.EXP301-FSSA1_03_03-Read From an Index.mp4 |
51.4 MB |
| VIDEOS EXP-301/178.EXP301-FSSA1_03_04-Read From the Log.mp4 |
25.3 MB |
| VIDEOS EXP-301/179.EXP301-FSSA1_03_05-Return the Log Content.mp4 |
15.2 MB |
| VIDEOS EXP-301/18.EXP301-WINDBG_04_01-Software Breakpoints.mp4 |
10.4 MB |
| VIDEOS EXP-301/180.EXP301-FSSA1_04_00-Bypassing ASLR with Format Strings.mp4 |
1.1 MB |
| VIDEOS EXP-301/181.EXP301-FSSA1_04_01-Parsing the Event Log.mp4 |
32.8 MB |
| VIDEOS EXP-301/182.EXP301-FSSA1_04_02-Leak Stack Address Remotely.mp4 |
24.3 MB |
| VIDEOS EXP-301/183.EXP301-FSSA1_04_03-Saving the Stack.mp4 |
5.6 MB |
| VIDEOS EXP-301/184.EXP301-FSSA1_04_04-Bypassing ASLR.mp4 |
45 MB |
| VIDEOS EXP-301/185.EXP301-FSSA1_05_00-Wrapping Up.mp4 |
1.3 MB |
| VIDEOS EXP-301/186.EXP301-FSSA2_00_00-Format String Specifier Attack Part II.mp4 |
1.1 MB |
| VIDEOS EXP-301/187.EXP301-FSSA2_01_00-Write Primitive with Format Strings.mp4 |
1.2 MB |
| VIDEOS EXP-301/188.EXP301-FSSA2_01_01-Format String Specifiers Revisited.mp4 |
6.2 MB |
| VIDEOS EXP-301/189.EXP301-FSSA2_01_02-Overcoming Limitations.mp4 |
49.7 MB |
| VIDEOS EXP-301/19.EXP301-WINDBG_04_02-Unresolved Function Breakpoint.mp4 |
8.6 MB |
| VIDEOS EXP-301/190.EXP301-FSSA2_01_03-Write to the Stack.mp4 |
31.2 MB |
| VIDEOS EXP-301/191.EXP301-FSSA2_01_04-Going for a DWORD.mp4 |
7.1 MB |
| VIDEOS EXP-301/192.EXP301-FSSA2_02_00-Overwriting EIP with Format Strings.mp4 |
949 KB |
| VIDEOS EXP-301/193.EXP301-FSSA2_02_01-Locating a Target.mp4 |
23.9 MB |
| VIDEOS EXP-301/194.EXP301-FSSA2_02_02-Obtaining EIP Control.mp4 |
12.9 MB |
| VIDEOS EXP-301/195.EXP301-FSSA2_03_00-Locating Storage Space.mp4 |
748 KB |
| VIDEOS EXP-301/196.EXP301-FSSA2_03_01-Finding Buffers.mp4 |
16.7 MB |
| VIDEOS EXP-301/197.EXP301-FSSA2_03_02-Stack Pivot.mp4 |
16.4 MB |
| VIDEOS EXP-301/198.EXP301-FSSA2_04_00-Getting Code Execution.mp4 |
953 KB |
| VIDEOS EXP-301/199.EXP301-FSSA2_04_01-ROP Limitations.mp4 |
15.9 MB |
| VIDEOS EXP-301/2.EXP301-WINDBG_01_00-Introduction to x86 Architecture.mp4 |
395 KB |
| VIDEOS EXP-301/20.EXP301-WINDBG_04_03-Breakpoint-Based Actions.mp4 |
11 MB |
| VIDEOS EXP-301/200.EXP301-FSSA2_04_02-Getting a Shell.mp4 |
4.2 MB |
| VIDEOS EXP-301/201.EXP301-FSSA2_05_00-Wrapping Up.mp4 |
935 KB |
| VIDEOS EXP-301/21.EXP301-WINDBG_04_04-Hardware Breakpoints.mp4 |
14.4 MB |
| VIDEOS EXP-301/22.EXP301-WINDBG_04_05-Stepping Through the Code.mp4 |
12.3 MB |
| VIDEOS EXP-301/23.EXP301-WINDBG_05_00-Additional WinDbg Features.mp4 |
799 KB |
| VIDEOS EXP-301/24.EXP301-WINDBG_05_01-Listing Modules and Symbols in WinDbg.mp4 |
10.6 MB |
| VIDEOS EXP-301/25.EXP301-WINDBG_05_02-Using WinDbg as a Calculator.mp4 |
2 MB |
| VIDEOS EXP-301/26.EXP301-WINDBG_05_03-Data Output Format.mp4 |
2.2 MB |
| VIDEOS EXP-301/27.EXP301-WINDBG_05_04-Pseudo Registers.mp4 |
3 MB |
| VIDEOS EXP-301/28.EXP301-WINDBG_06_00-Wrapping Up.mp4 |
1.4 MB |
| VIDEOS EXP-301/29.EXP301-STACKOF_00_00-Exploiting Stack Overflows.mp4 |
1.2 MB |
| VIDEOS EXP-301/3.EXP301-WINDBG_01_01-Program Memory.mp4 |
4.4 MB |
| VIDEOS EXP-301/30.EXP301-STACKOF_01_00-Stack Overflows Introduction.mp4 |
6.6 MB |
| VIDEOS EXP-301/31.EXP301-STACKOF_02_00-Installing the Sync Breeze Application.mp4 |
6.4 MB |
| VIDEOS EXP-301/32.EXP301-STACKOF_03_00-Crashing the Sync Breeze Application.mp4 |
9.8 MB |
| VIDEOS EXP-301/33.EXP301-STACKOF_04_00-Win32 Buffer Overflow Exploitation.mp4 |
720 KB |
| VIDEOS EXP-301/34.EXP301-STACKOF_04_01-A Word About DEP ASLR and CFG.mp4 |
2.2 MB |
| VIDEOS EXP-301/35.EXP301-STACKOF_04_02-Controlling EIP.mp4 |
19.3 MB |
| VIDEOS EXP-301/36.EXP301-STACKOF_04_03-Locating Space for Our Shellcode.mp4 |
16.6 MB |
| VIDEOS EXP-301/37.EXP301-STACKOF_04_04-Checking for Bad Characters.mp4 |
15.7 MB |
| VIDEOS EXP-301/38.EXP301-STACKOF_04_05-Redirecting the Execution Flow.mp4 |
1.3 MB |
| VIDEOS EXP-301/39.EXP301-STACKOF_04_06-Finding a Return Address.mp4 |
34.7 MB |
| VIDEOS EXP-301/4.EXP301-WINDBG_01_02-CPU Registers.mp4 |
5.4 MB |
| VIDEOS EXP-301/40.EXP301-STACKOF_04_07-Generating Shellcode with Metasploit.mp4 |
5.5 MB |
| VIDEOS EXP-301/41.EXP301-STACKOF_04_08-Getting a Shell.mp4 |
16.2 MB |
| VIDEOS EXP-301/42.EXP301-STACKOF_04_09-Improving the Exploit.mp4 |
5.4 MB |
| VIDEOS EXP-301/43.EXP301-STACKOF_05_00-Wrapping Up.mp4 |
1.1 MB |
| VIDEOS EXP-301/44.EXP301-SEH_00_00-Exploiting SEH Overflows.mp4 |
1.6 MB |
| VIDEOS EXP-301/45.EXP301-SEH_01_00-Installing the Sync Breeze Application.mp4 |
7.1 MB |
| VIDEOS EXP-301/46.EXP301-SEH_02_00-Crashing Sync Breeze.mp4 |
3.5 MB |
| VIDEOS EXP-301/47.EXP301-SEH_03_00-Analyzing the Crash in WinDbg.mp4 |
4.1 MB |
| VIDEOS EXP-301/48.EXP301-SEH_04_00-Introduction to Structured Exception Handling.mp4 |
1.9 MB |
| VIDEOS EXP-301/49.EXP301-SEH_04_01-Understanding SEH.mp4 |
11.1 MB |
| VIDEOS EXP-301/5.EXP301-WINDBG_02_00-Introduction to Windows Debugger.mp4 |
943 KB |
| VIDEOS EXP-301/50.EXP301-SEH_04_02-SEH Validation.mp4 |
6.1 MB |
| VIDEOS EXP-301/51.EXP301-SEH_05_00-Structured Exception Handler Overflows.mp4 |
30.8 MB |
| VIDEOS EXP-301/52.EXP301-SEH_05_01-Gaining Code Execution.mp4 |
26.6 MB |
| VIDEOS EXP-301/53.EXP301-SEH_05_02-Detecting Bad Characters.mp4 |
9.6 MB |
| VIDEOS EXP-301/54.EXP301-SEH_05_03-Finding a PPR Instruction Sequence.mp4 |
29.5 MB |
| VIDEOS EXP-301/55.EXP301-SEH_05_04-Island-Hopping in Assembly.mp4 |
40.7 MB |
| VIDEOS EXP-301/56.EXP301-SEH_05_05-Obtaining a Shell.mp4 |
9.9 MB |
| VIDEOS EXP-301/57.EXP301-SEH_06_00-Wrapping Up.mp4 |
1.2 MB |
| VIDEOS EXP-301/58.EXP301-IDA_00_00-Introduction to IDA Pro.mp4 |
2.3 MB |
| VIDEOS EXP-301/59.EXP301-IDA_01_00-IDA Pro 101.mp4 |
1 MB |
| VIDEOS EXP-301/6.EXP301-WINDBG_02_01-What is a Debugger.mp4 |
1.5 MB |
| VIDEOS EXP-301/60.EXP301-IDA_01_01-Installing IDA Pro.mp4 |
2.7 MB |
| VIDEOS EXP-301/61.EXP301-IDA_01_02-The IDA Pro User Interface.mp4 |
18.4 MB |
| VIDEOS EXP-301/62.EXP301-IDA_01_03-Basic Functionality.mp4 |
11.5 MB |
| VIDEOS EXP-301/63.EXP301-IDA_01_04-Search Functionality.mp4 |
8.4 MB |
| VIDEOS EXP-301/64.EXP301-IDA_02_00-Working with IDA Pro.mp4 |
1.1 MB |
| VIDEOS EXP-301/65.EXP301-IDA_02_01-Static-Dynamic Analysis Synchronization.mp4 |
10.7 MB |
| VIDEOS EXP-301/66.EXP301-IDA_02_02-Tracing Notepad.mp4 |
18.5 MB |
| VIDEOS EXP-301/67.EXP301-IDA_03_00-Wrapping Up.mp4 |
1.2 MB |
| VIDEOS EXP-301/68.EXP301-EGG_00_00-Overcoming Space Restrictions Egghunters.mp4 |
1.5 MB |
| VIDEOS EXP-301/69.EXP301-EGG_01_00-Crashing the Savant Web Server.mp4 |
9.3 MB |
| VIDEOS EXP-301/7.EXP301-WINDBG_02_02-WinDbg Interface.mp4 |
4.4 MB |
| VIDEOS EXP-301/70.EXP301-EGG_02_00-Analyzing the Crash in WinDbg.mp4 |
7.6 MB |
| VIDEOS EXP-301/71.EXP301-EGG_03_00-Detecting Bad Characters.mp4 |
5.9 MB |
| VIDEOS EXP-301/72.EXP301-EGG_04_00-Gaining Code Execution.mp4 |
22.1 MB |
| VIDEOS EXP-301/73.EXP301-EGG_04_01-Partial EIP Overwrite.mp4 |
26.9 MB |
| VIDEOS EXP-301/74.EXP301-EGG_04_02-Changing the HTTP Method.mp4 |
20.1 MB |
| VIDEOS EXP-301/75.EXP301-EGG_04_03-Conditional Jumps.mp4 |
15.9 MB |
| VIDEOS EXP-301/76.EXP301-EGG_05_00-Finding Alternative Places to Store Large Buffers.mp4 |
10 MB |
| VIDEOS EXP-301/77.EXP301-EGG_05_01-The Windows Heap Memory Manager.mp4 |
5 MB |
| VIDEOS EXP-301/78.EXP301-EGG_06_00-Finding our Buffer - The Egghunter Approach.mp4 |
1.9 MB |
| VIDEOS EXP-301/79.EXP301-EGG_06_01-Keystone Engine.mp4 |
4.7 MB |
| VIDEOS EXP-301/8.EXP301-WINDBG_02_03-Understanding the Workspace.mp4 |
1.9 MB |
| VIDEOS EXP-301/80.EXP301-EGG_06_02-System Calls and Egghunters.mp4 |
25 MB |
| VIDEOS EXP-301/81.EXP301-EGG_06_03-Identifying and Addressing the Egghunter Issue.mp4 |
19.6 MB |
| VIDEOS EXP-301/82.EXP301-EGG_06_04-Obtaining a Shell.mp4 |
13.4 MB |
| VIDEOS EXP-301/83.EXP301-EGG_07_00-Improving the Egghunter Portability Using SEH.mp4 |
28.9 MB |
| VIDEOS EXP-301/84.EXP301-EGG_07_01-Identifying the SEH-Based Egghunter Issue.mp4 |
41 MB |
| VIDEOS EXP-301/85.EXP301-EGG_07_02-Porting the SEH Egghunter to Windows 10.mp4 |
15.3 MB |
| VIDEOS EXP-301/86.EXP301-EGG_08_00-Wrapping Up.mp4 |
1.1 MB |
| VIDEOS EXP-301/87.EXP301-SHELL_00_00-Creating Custom Shellcode.mp4 |
1.7 MB |
| VIDEOS EXP-301/88.EXP301-SHELL_01_00-Calling Conventions on x86.mp4 |
2.1 MB |
| VIDEOS EXP-301/89.EXP301-SHELL_02_00-The System Call Problem.mp4 |
7.2 MB |
| VIDEOS EXP-301/9.EXP301-WINDBG_02_04-Debugging Symbols.mp4 |
4.7 MB |
| VIDEOS EXP-301/90.EXP301-SHELL_03_00-Finding kernel32.dll.mp4 |
2.8 MB |
| VIDEOS EXP-301/91.EXP301-SHELL_03_01-PEB Method.mp4 |
10.3 MB |
| VIDEOS EXP-301/92.EXP301-SHELL_03_02-Assembling the Shellcode.mp4 |
19.6 MB |
| VIDEOS EXP-301/93.EXP301-SHELL_04_00-Resolving Symbols.mp4 |
4.2 MB |
| VIDEOS EXP-301/94.EXP301-SHELL_04_01-Export Directory Table.mp4 |
5.8 MB |
| VIDEOS EXP-301/95.EXP301-SHELL_04_02-Working with the Export Names Array.mp4 |
26.1 MB |
| VIDEOS EXP-301/96.EXP301-SHELL_04_03-Computing Function Name Hashes.mp4 |
20.6 MB |
| VIDEOS EXP-301/97.EXP301-SHELL_04_04-Fetching the VMA of a Function.mp4 |
22.4 MB |
| VIDEOS EXP-301/98.EXP301-SHELL_05_00-NULL-Free Position-Independent Shellcode (PIC).mp4 |
3.9 MB |
| VIDEOS EXP-301/99.EXP301-SHELL_05_01-Avoiding NULL Bytes.mp4 |
8.4 MB |