Posts:

Exploit writing tutorial part 7 : Unicode – from 0x00410041 to calc

Finally … after spending a couple of weeks working on unicode and unicode exploits, I’m glad and happy to be able to release this next article in my basic exploit writing series : writing exploits for stack based unicode Read more

Read More

Str0ke R.I.P. (or alive & kicking ?)

I have received a very sad message this morning that str0ke (milw0rm) has passed away yesterday.

I sincerely hope this is some (bad and morbid) joke, but if it’s not then all I can say is that this is Read more

Read More

Exchange 2010 Certificates

In an older blog post on Certificate Authorities, I have provided some information about the process to generate Exchange 2007 certificates.Β  This process has slightly changed in Exchange 2010, and Johan Delimon (pro-exchange.be) has written an excellent article Read more

Read More

Backup & Restore Windows Server based Print Servers

After having to recover a broken Windows Server based print server yesterday, I decided to write this small article on how to set up print server backups, and describe the simple process of recovering the print server after a Read more

Read More

Metasploit Project acquired by Rapid7

Just a few moments ago, Neil Roiter has reported on SearchSecurity that The Metasploit Project (and the Metasploit Framework) has been acquired by Rapid7, a network vulnerability management vendor. This news has been confirmed by Rapid7 (see website) Read more

Read More

Script to backup Cisco switches via telnet / tftp

A couple of days ago, I have released a small perl script to back up Cisco IOS based switches via telnet.

I know there are a couple of similar scripts available on the internet, but most of them either Read more

Read More

Fuzzing with Metasploit : Simple FTP fuzzer

Just wanted to drop a quick note about the release of another free script. This time I’ve written a simple FTP fuzzer (with a little help from HDMoore) in Metasploit. You can read more about it (and download the Read more

Read More

Exploit writing tutorial part 6 : Bypassing Stack Cookies, SafeSeh, SEHOP, HW DEP and ASLR

Introduction

In all previous tutorials in this Exploit writing tutorial series, we have looked at building exploits that would work on Windows XP / 2003 server.

The success of all of these exploits (whether they are based on direct Read more

Read More

Exploit writing tutorial part 5 : How debugger modules & plugins can speed up basic exploit development

In the first parts of this exploit writing tutorial, I have mainly used Windbg as a tool to watch registers and stack contents while evaluating crashes and building exploits. Today, I will discuss some other debuggers and debugger plugins Read more

Read More