Improving The ROP Exploit

Posted on Wed 14 January 2015 in x86-32 Linux • Tagged with exploit development, linux, 32bit, fuzzing, buffer overflow, rop

Adding to the last return orientated programming exploit by using a few more advanced ROP techniques


Continue reading

Beating ASLR and NX using ROP

Posted on Sun 11 January 2015 in x86-32 Linux • Tagged with exploit development, linux, 32bit, fuzzing, buffer overflow, rop

Using return orientated programming to beat both address space layout randomization and never execute on 32bit Linux


Continue reading

Reversing A Simple Obfuscated Application

Posted on Tue 30 September 2014 in Reverse Engineering • Tagged with linux, 32bit, debugging, reverse engineering

A walk through of some basic manual obfucation and deobfuscation methods for IA32


Continue reading

Ret2Libc and ROP

Posted on Wed 06 August 2014 in x86-32 Linux • Tagged with exploit development, linux, 32bit, fuzzing, buffer overflow, rop, ret2libc

Exploiting a buffer overflow by using return to libc and basic return orientated programming to beat certain protections including never execute (NX)


Continue reading

An Easy Windows Crackme

Posted on Sat 02 August 2014 in Reverse Engineering • Tagged with windows, reverse engineering, 32bit, crackme

Cracking an easy Windows crackme from the site http://crackmes.de


Continue reading

Beating ASLR

Posted on Mon 07 July 2014 in x86-32 Linux • Tagged with exploit development, linux, 32bit, aslr, buffer overflow

Exploiting a buffer overflow vulnerability with address space layout randomization in place


Continue reading

Basic Binary Auditing

Posted on Tue 01 July 2014 in Reverse Engineering • Tagged with exploit development, linux, 32bit, reverse engineering, buffer overflow, debugging

Detecting buffer overflows, format string and integer overflow vulnerabilities using binary analysis in gdb on 32bit Linux


Continue reading

Remote Exploitation

Posted on Thu 12 June 2014 in x86-32 Linux • Tagged with exploit development, linux, 32bit, fuzzing, buffer overflow

Hacking a network service with a buffer overflow vulnerability on 32bit Linux without stack protections


Continue reading

Plain Format String Vulnerability

Posted on Tue 20 May 2014 in x86-32 Linux • Tagged with exploit development, linux, 32bit, fuzzing, format string

Finding, exploiting and fixing a simple format string vulnerability on 32bit Linux without any stack protections


Continue reading

An Easy Linux Crackme

Posted on Sun 11 May 2014 in Reverse Engineering • Tagged with linux, reverse engineering, 32bit, crackme

Cracking an easy Linux crackme file from http://crackmes.de


Continue reading