exploiting

MS08_067 exploit analysis – part II defeating DEP

Written by  on December 30, 2015

In the previous part of this case of study, we developed a valid exploit for the ms08_067 vulnerability. We used a windows xp sp2 box with the DEP feature[...]

MS08_067 exploit analysis – part I

Written by  on December 23, 2015

In this case of study we’ll look inside the MS08_067 vulnerability and write anĀ  effective exploit for exploiting it. MS08_67 is one of the most[...]

Avoiding badchars & small buffers with custom shellcode – OdinSecureFTPclient SEH exploit

Written by  on August 10, 2015

Hi there fellow pirates P-) ! This time we’ll be studying a vuln I just found on OdineSecureFTP client. Using the evil ftp server I fuzzed the aplication[...]

Writing exploits with an egghunter – part 1

Written by  on August 1, 2015

Today we’ll be studying the winam 6.12 playlist buffer overflow vuln. I found that vuln very interesting to study as it requieres an important amount[...]

Bypass ASLR with partial EIP overwrite

Written by  on July 30, 2015

Hi there, here we’ll be avoiding ASLR with an interesting technique. For those who don’t know, ASLR means address space layout randomization[...]