In one of my previous posts (part 1 of writing stack based buffer overflow exploits), I have explained the basisc about discovering a vulnerability and using that information to build a Read more
I receive a lot of emails. (Please don't make it worse, thanks!) Unfortunately I don't have as much spare time as I used to, or would like to, so I often have no other choice than Read more
Table of Contents
Hi,
A few moments ago, I was informed about an article on www.securelist.com and the fact that Corelan Team was mentioned in that post. Apparently a researcher at Kaspersky Labs found a piece of text ("You have been owned Read more
An Egghunter is nothing more than an assembly routine to find shellcode somewhere in memory. We typically deploy an Egghunter when there is no more room in our buffer that we can use to initially redirect EIP Read more
Subscribe