I receive a lot of emails. (Please don’t make it worse, thanks!) Unfortunately I don’t have as much spare time as I used to, or would like to, so I often have no other choice than Read more
Table of Contents
Hi,
A few moments ago, I was informed about an article on www.securelist.com and the fact that Corelan Team was mentioned in that post. Apparently a researcher at Kaspersky Labs found a piece of text ("You have been owned Read more
An Egghunter is nothing more than an assembly routine to find shellcode somewhere in memory. We typically deploy an Egghunter when there is no more room in our buffer that we can use to initially redirect EIP Read more
I think we all agree that bypassing DEP (and ASLR) is no longer a luxury today. As operating systems (such as Windows 7) continue to gain popularity, exploit developers are forced to deal with increasingly more memory protection Read more
Yesterday, sickn3ss (one of the frequent visitors of the #corelan channel on freenode IRC) posted a really interesting question.
While testing ROP gadgets, as part of the process of building a DEP bypass exploit for WM Downloader, Read more