Needles in heaps, allocator primitives, posts, tutorials, papers, research notes ...

Your search for

resolved the following candidate gadgets:

Exploit writing tutorial part 7 : Unicode - from 0x00410041 to calc

Finally โ€ฆ after spending a couple of weeks working on unicode and unicode exploits, Iโ€™m glad and happy to be able to release this next article in my basic exploit writing series : writing exploits for stack based unicode Read more

Exploit writing tutorial part 6 : Bypassing Stack Cookies, SafeSeh, SEHOP, HW DEP and ASLR

Introduction

In all previous tutorials in this Exploit writing tutorial series, we have looked at building exploits that would work on Windows XP / 2003 server.

The success of all of these exploits (whether they are based on direct Read more

Exploit writing tutorial part 5 : How debugger modules & plugins can speed up basic exploit development

In the first parts of this exploit writing tutorial, I have mainly used Windbg as a tool to watch registers and stack contents while evaluating crashes and building exploits. Today, I will discuss some other debuggers and debugger plugins Read more

Exploit writing tutorial part 4 : From Exploit to Metasploit - The basics

In the first parts of the exploit writing tutorial, I have discussed some common vulnerabilities that can lead to 2 types of exploits : stack based buffer overflows (with direct EIP overwrite), and stack based buffer overflows that take Read more

Exploit writing tutorial part 2 : Stack Based Overflows - jumping to shellcode

Where do you want to jmp today ?

In one of my previous posts (part 1 of writing stack based buffer overflow exploits), I have explained the basisc about discovering a vulnerability and using that information to build a Read more

Exploit writing tutorial part 1 : Stack Based Overflows

Last friday (july 17th 2009), somebody (nick)named โ€˜Crazy_Hackerโ€™ has reported a vulnerability in Easy RM to MP3 Conversion Utility (on XP SP2 En), via packetstormsecurity.org. (see http://packetstormsecurity.org/0907-exploits/). The vulnerability report included a proof of concept exploit (which, by Read more

About

About me Hi, My name is Peter Van Eeckhoutte. You may know me as corelanc0d3r or as the "Corelan" guy.  You can contact me in many different ways. I was born in 1975 and spent my childhood in a Read more

Corelan Team

About the Corelan Team Founded in 2009 by Peter Van Eeckhoutte, Corelan Team was a group of IT Security researchers/enthusiasts/professionals/hobbyists who shared the same interests, mainly focused on 3 things : Research : The team enjoyed working together to perform Read more

Windows 10 egghunter (wow64) and more

Introduction

Ok, I have a confession to make, I have always been somewhat intrigued by egghunters. That doesn't mean that I like to use (or abuse) an egghunter just because I fancy what it does. In fact, I Read more

How to become a pentester

Intro

I receive a lot of emails. ย (Please don't make it worse, thanks!) ย  Unfortunately I don't have as much spare time as I used to, or would like to, so I often have no other choice than Read more