Posts Tagged “Exploit Development”
-
[Pwnable.kr] Toddler's Bottle: fd, collision, bof
Walkthroughs for the first 3 Pwnable.kr challenges (fd, col, bof)
-
Exploit Dev 101: Bypassing ASLR on Windows
Brief discussion on techniques to bypass ASLR assuming no other protection is in place.
-
Exploit Dev 101: Jumping to Shellcode
Discussion about various methods on locating and jumping to shellcode in stack-based exploits and others.
-
Introduction to Manual Backdooring
Click title to see the PDF. Mirror: https://www.exploit-db.com/docs/42061.pdf
- Linux/x86 - Disable ASLR Shellcode (71 bytes)
- Analyzing Metasploit linux/x86/shell_bind_tcp_random_port module using Libemu
- Analyzing Metasploit linux/x86/exec module using Ndisasm
- Linux/x86 - Code Polymorphism examples
- Analyzing Metasploit linux/x86/adduser module using GDB
- Analyzing Metasploit linux/x86/adduser module using GDB
- ROT-N Shellcode Encoder/Generator (Linux x86)
- Skape's Egg Hunter (null-free/Linux x86)
- TCP Bind Shell in Assembly (null-free/Linux x86)
- Shellcode reduction tips (x86)