Introduction Hi all, Over the course of the past few weeks ago, I received a number of “emergency” calls from some relatives, asking me to look at their computer because “things were broken”, “things looked different” and “I think my computer got hacked”.† I quickly realized that their computers got upgraded to Windows 10. We […]
Foreword Over the past few years, Corelan Team has received many exploit related questions, including “I have found a bug and I don’t seem to control EIP, what can I do ?”; “Can you write a tutorial on heap overflows” or “what are Integer overflows”. In this article, Corelan Team member Jason Kratzer (pyoor) tries […]
Introduction For the past year or so I’ve spent a significant amount of time fuzzing various applications with the hopes of identifying exploitable crashes.† Early on in my research I quickly realized that building fuzzers and generating large quantities of crashes, even for heavily targeted applications, was easy.† However, determining the exploitability of these crashes, […]
Introduction Time flies. Almost 3 weeks have passed since we announced the ability to run mona.py under WinDBG.† A lot of work has been done on mona.py in the meantime.† We improved stability and performance, updated to pykd.pyd 0.2.0.14 and ported a few additional immlib methods to windbglib. I figured this would be a good […]
Ho Ho Ho friends, It has been a while since we posted something on the Corelan Team blog, I guess we all have been busy doing … stuff and things, here and there.† Nevertheless, as the year is close to filling up 100%, it’s probably a good time to start thinking about finding some convincing […]
Good morning, Since doing live-blogging seemed to work out pretty well yesterday, I’ll do the same thing again today. ¬†Please join in for day 3 at BlackHat Europe 2012, in a cloudy and rainy Amsterdam. The first talk I attended today was : “Secure Password Managers” and “Military Grade Encryption” on Smartphones Andrey Belenko and […]
A few days ago a friend approached me and asked how he could see the import address table under immunity debugger and if this could be done using the command line.
I figured this would be a good time to take a look at what the IAT is, how we can list the IAT and what common reversing hurdles could be with regards to the IAT.