
Reverse engineer a simple vulnerable service to discover and demonstrate some of its properties.Įxplore over 200 vulnerable services from the DARPA Cyber Grand Challenge.

Illustrate the lossy nature of code compilation and underscores the challenges of reverse engineering a compiled binary. Risks of the setuid feature, including environment variables, derived from a SEED lab. Use metasploit on a Kali Linux system to attack a "metasploitable" host. Introduction to memory references made by printf, and the potential for exploitation.Įxplore C library printf function vulnerabilities, derived from a SEED lab.Įxploit a program using a buffer overflow and return-to-libc, derived from a SEED lab. To check if promiscuous mode is enabled, click Capture > Options and verify the “Enable promiscuous mode on all interfaces” checkbox is activated at the bottom of this window.Introduction to memory references beyond boundaries of C data structures.Īn example program vulnerable to a stack buffer overflow, derived from a SEED lab.


If you have promiscuous mode enabled-it’s enabled by default-you’ll also see all the other packets on the network instead of only packets addressed to your network adapter. Wireshark captures each packet sent to or from your system. You can configure advanced features by clicking Capture > Options, but this isn’t necessary for now.Īs soon as you click the interface’s name, you’ll see the packets start to appear in real time. For example, if you want to capture traffic on your wireless network, click your wireless interface. Capturing PacketsĪfter downloading and installing Wireshark, you can launch it and double-click the name of a network interface under Capture to start capturing packets on that interface. Don’t use this tool at work unless you have permission.

Just a quick warning: Many organizations don’t allow Wireshark and similar tools on their networks.
