Improving The ROP Exploit

Posted on Wed 14 January 2015 in x86-32 Linux • Tagged with exploit development, linux, 32bit, fuzzing, buffer overflow, rop

Adding to the last return orientated programming exploit by using a few more advanced ROP techniques


Continue reading

Beating ASLR and NX using ROP

Posted on Sun 11 January 2015 in x86-32 Linux • Tagged with exploit development, linux, 32bit, fuzzing, buffer overflow, rop

Using return orientated programming to beat both address space layout randomization and never execute on 32bit Linux


Continue reading

SQL Injections

Posted on Tue 02 December 2014 in Web Hacking • Tagged with web, sql injection, python

A walkthrough of some reasonably advanced SQL injection techniques and exploitation


Continue reading

Rootkit for Hiding Files

Posted on Thu 23 October 2014 in Linux Kernel Hacking • Tagged with kernel development, linux, c, rootkit, kernel hacking

Building a basic rootkit for hiding files from normal operating system commands on Linux


Continue reading

Reversing A Simple Obfuscated Application

Posted on Tue 30 September 2014 in Reverse Engineering • Tagged with linux, 32bit, debugging, reverse engineering

A walk through of some basic manual obfucation and deobfuscation methods for IA32


Continue reading

Usermode Application Debugging Using KD

Posted on Wed 24 September 2014 in Reverse Engineering • Tagged with windows, reverse engineering, debugging

Debugging a usermode application using the kernel debugger kd.exe on Windows


Continue reading

Reflected XSS at PentesterAcademy

Posted on Sat 09 August 2014 in Web Hacking • Tagged with web, xss, pentesteracademy

Solving some cross site scripting challenges at pentester academy


Continue reading

Ret2Libc and ROP

Posted on Wed 06 August 2014 in x86-32 Linux • Tagged with exploit development, linux, 32bit, fuzzing, buffer overflow, rop, ret2libc

Exploiting a buffer overflow by using return to libc and basic return orientated programming to beat certain protections including never execute (NX)


Continue reading

An Easy Windows Crackme

Posted on Sat 02 August 2014 in Reverse Engineering • Tagged with windows, reverse engineering, 32bit, crackme

Cracking an easy Windows crackme from the site http://crackmes.de


Continue reading

System Call Hooking

Posted on Thu 10 July 2014 in Linux Kernel Hacking • Tagged with kernel development, linux, c, rootkit, kernel hacking, function hooking

Hooking kernel functions on Linux, used by usermode applications, for malicious purposes


Continue reading