DrayTek Vigor310 devices through 4.3.2.6 allow a remote attacker to execute arbitrary code via the function ft_payload_dns(), because a byte sign-extension operation occurs for the length argument of a _memcpy call, leading to a heap-based Buffer Overflow.
#TRAINING

Training services from Alex Ionescu and Yarden Shafir.

Have fun hacking our virtual machines and learning.

A free online platform for learning cyber security, using hands-on exercises and labs, all through your browser!

Developer security training from Snyk. Snyk Learn teaches developers how to stay secure with interactive lessons exploring vulnerabilities across a variety of languages and ecosystems.

Node.js Secure Coding blog and educational training content. Master hands-on Node.js security with Node.js Secure Coding education and learn how to defend against JavaScript Command Injection vulnerabilities and gain backend development skills to exploit and prevent Path Traversal attacks by reviewing real-world vulnerable npm packages and insecure code.

Learn ethical hacking skills with hands-on labs and education from cyber security experts.

The wargames offered by the OverTheWire community can help you to learn and practice security concepts in the form of fun-filled games.

Learn to secure the web one step at a time, with our practical, interactive learning materials. Covering the latest research, and completely free.

A fun, free platform for learning modern cryptography.

The fast, easy, and affordable way to train your hacking skills.

NEW

Experience, real-world, byte sized cloud security labs for training cyber warriors. From beginners to pros, our engaging platform allows you to secure your defenses, ignite your career and stay ahead of threats.

SecureWeb3 Academy offers online training courses to provide awareness of a range of web3 risks and threats and how to mitigate these. our training delivers the latest information and valuable insights to help you and your organisation navigate the emerging landscape of web3 technology with confidence.

Whether you've just started your hacker journey or you're just looking for some new challenges, the Hacker101 CTF has something for you.

Courses to learn more about blue team skills. Check out our hands-on courses to gain and sharpen investigation/detection skills.

An intro to binary exploitation / reverse engineering course based around ctf challenges.

exploit.education provides a variety of resources that can be used to learn about vulnerability analysis, exploit development, software debugging, binary analysis, and general cyber security issues.

Free Training Tutorials & Videos for IT Courses.

The Ethernaut is a Web3/Solidity based wargame played in the Ethereum Virtual Machine. Each level is a smart contract that needs to be 'hacked'. The game is 100% open source and all levels are contributions made by other players.

Our industry-leading platform is the most effective solution for learning modern binary exploitation through a world-class curriculum developed by RET2. Acquire the skills necessary to perform independent vulnerability research.

linux-training.be gives you books for free to study Linux.

A comprehensive module-based malware development course that provides fundamental to advanced level training|

The cybersecurity upskilling platform. Hack The Box gives individuals, businesses and universities the tools they need to continuously improve their cybersecurity capabilities — all in one place.