Needles in heaps, allocator primitives, posts, tutorials, papers, research notes ...

Your search for

resolved the following candidate gadgets:

Exploit writing tutorial part 2 : Stack Based Overflows - jumping to shellcode

Where do you want to jmp today ?

In one of my previous posts (part 1 of writing stack based buffer overflow exploits), I have explained the basisc about discovering a vulnerability and using that information to build a Read more

About

About me Hi, My name is Peter Van Eeckhoutte. You may know me as corelanc0d3r or as the "Corelan" guy.  You can contact me in many different ways. I was born in 1975 and spent my childhood in a Read more

Corelan Team

About the Corelan Team Founded in 2009 by Peter Van Eeckhoutte, Corelan Team was a group of IT Security researchers/enthusiasts/professionals/hobbyists who shared the same interests, mainly focused on 3 things : Research : The team enjoyed working together to perform Read more

How to become a pentester

Intro

I receive a lot of emails.  (Please don't make it worse, thanks!)   Unfortunately I don't have as much spare time as I used to, or would like to, so I often have no other choice than Read more

Corelan Team reply to false allegation made by Kaspersky

Hi,

A few moments ago, I was informed about an article on www.securelist.com and the fact that Corelan Team was mentioned in that post.  Apparently a researcher at Kaspersky Labs found a piece of text ("You have been owned Read more

Many roads to IAT

A few days ago a friend approached me and asked how he could see the import address table under immunity debugger and if this could be done using the command line. I figured this would be a good time to take a look at what the IAT is, how we can list the IAT and what common reversing hurdles could be with regards to the IAT. Read more

WoW64 Egghunter

Traditional Egghunter

An Egghunter is nothing more than an assembly routine to find shellcode somewhere in memory. We typically deploy an Egghunter when there is no more room in our buffer that we can use to initially redirect EIP Read more

Metasploit Bounty - the Good, the Bad and the Ugly

On June 14, 2011 HD Moore announced the Metasploit Bounty contest, offering a cash incentive for specific vulnerabilities to be submitted as modules in the Metasploit Framework. Titled "30 exploits, $5000 in 5 weeks", a post on the Rapid7 blog lists the 30 "bounties" selected by the MSF team, waiting for someone to claim and submit a working exploit module. Read more