Basic Binary Auditing

Posted on Tue 01 July 2014 in Reverse Engineering • Tagged with exploit development, linux, 32bit, reverse engineering, buffer overflow, debugging

Detecting buffer overflows, format string and integer overflow vulnerabilities using binary analysis in gdb on 32bit Linux


Continue reading

Remote Exploitation

Posted on Thu 12 June 2014 in x86-32 Linux • Tagged with exploit development, linux, 32bit, fuzzing, buffer overflow

Hacking a network service with a buffer overflow vulnerability on 32bit Linux without stack protections


Continue reading

A Simple Character Device

Posted on Fri 06 June 2014 in Linux Kernel Hacking • Tagged with kernel development, linux, c

Implementing a character device on Linux as a loadable kernel module


Continue reading

Command Injection in Basilic

Posted on Mon 02 June 2014 in Web Hacking • Tagged with web, command injection

Finding and exploiting a comand injection vulnerability in the open source Basilic


Continue reading

Plain Format String Vulnerability

Posted on Tue 20 May 2014 in x86-32 Linux • Tagged with exploit development, linux, 32bit, fuzzing, format string

Finding, exploiting and fixing a simple format string vulnerability on 32bit Linux without any stack protections


Continue reading

An Easy Linux Crackme

Posted on Sun 11 May 2014 in Reverse Engineering • Tagged with linux, reverse engineering, 32bit, crackme

Cracking an easy Linux crackme file from http://crackmes.de


Continue reading

First LKM

Posted on Sat 10 May 2014 in Linux Kernel Hacking • Tagged with kernel development, linux, c

Writing a 'hello world' loadable kernel module for Linux


Continue reading

Plain Buffer Overflow

Posted on Thu 08 May 2014 in x86-32 Linux • Tagged with exploit development, linux, 32bit, fuzzing, buffer overflow

Finding, exploiting and fixing a simple buffer overflow on 32bit Linux without stack protections


Continue reading