Caution When [Reversing]

Malware Analysis, Reverse Engineering, Digital Forensics & Other Security Bytes ...

Sunday, 27 January 2013

Exploit Writing Tutorials from The Corelan Team

The Corelan Team did a really good job on these exploit writing tutorials. If you're interested in learning how to write exploits, this is a great place to start.

Part 1: Stack Based Overflows
Part 2: Stack Based Overflows - Jumping to Shellcode
Part 3a: SEH Based Exploits
Part 3b: SEH Based Exploits - Another Example
Part 4: From Exploit to Metasploit - the Basics
Part 5: How Debugger Modules & Plugins Speed Up Exploit Development
Part 6: Bypassing Stack Cookies, SafeSEH, SEHOP, HW DEP and ASLR
Part 7: Unicode - from 0x00410041 to calc
Part 8: Win32 Egg Hunting
Part 9: Introduction to Win32 Shellcoding
Part 10: Chaining DEP with ROP
Part 11: Heap Spraying Demystified

Credits for all the above goes to the Corelan Team.
Posted by vahilor at 19:29
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels: buffer overflow exploits, debugging, egg hunting, exploit writing, exploitation, reverse engineering, shellcoding, stack overflow exploits, vulnerability finding

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Blog Archive

  • ►  2016 (1)
    • ►  May (1)
  • ►  2014 (2)
    • ►  November (1)
    • ►  September (1)
  • ▼  2013 (12)
    • ►  July (6)
    • ►  February (1)
    • ▼  January (5)
      • Exploit Writing Tutorials from The Corelan Team
      • RCE - Unpacking Primer
      • Kernel Debugging and Reversing Primer
      • Digital Forensic War Game [Level 2] - Simple Backdoor
      • Common Windows API used by Malware

Blogroll

  • Cisco - The APJC Network
  • Dr Fu's Security Blog
  • Lenny Zelster on Information Security
  • MORPHISEC CYBER SECURITY BLOG
  • Malware Traffic Analysis
  • Nige the Security Guy
  • Palo Alto Networks - Unit 42
  • SANS Computer Forensics Blog
  • SQRRL BLOG
  • Schneier on Security
  • System Forensics

Labels

apt arp arp cache poisoning arp spoofing backdoor backoff pos bgp blackenergy buffer overflow exploits byte distribution cnc command and control csrf ctf cve debugging digital forensics dridex dropper dyre dyreza egg hunting exploit kit malware exploit writing exploitation exploits forensics hex code analysis hex decoding host based indicators http hub incident response internetworking iworm kernel debugging locky malware malware analysis malware triage memory network based indicators network capture analysis network protocols operation huyao osi model packers persistence phishing processes ransomware redoctober reverse engineering rig exploit kit rootpipe router rovnix sandworm security bytes shell code shellcoding stack overflow exploits switch tcp threads udp unpacking upx virustotal vulnerabilities vulnerability finding windows 7 wirelurker xor decoding xss zeroaccess
Simple theme. Powered by Blogger.