nullbyte.png

Attack on Stack

Article cover image
May 15, 2015

Hi everyone!In the previous part of this series we introduced remote code arbitrary execution via buffer overflows using all of our past experiences.As I said back then, today I'll be explaining the o ...

Article cover image
May 15, 2015

Hi everyone.Recently I've been studying some topics about Assembly, memory and exploitation, and thought I could write something nice, easy and fast about it, just because I like to share what I learn ...

Article cover image
May 15, 2015

Hi everyone!After messing around a little bit with IDA and Hopper disassemblers and briefly introducing you to memory, registers and Assembly, we are going to understand what happens when a process is ...

Article cover image
May 15, 2015

Hi everyone!Last time we explained what roles Ebp and Esp registers have. We first introduced function's stack frame building, return address and calling conventions, but left some of the concepts flo ...

Article cover image
May 15, 2015

Hi everyone!Last time we finished analyzing the assembly representation of our vulnerable piece of code (have I ever told you it is vulnerable?). This time we are going to introduce some fundaments ab ...

Article cover image
May 15, 2015

Hi everyone!In the previous part of this series, I introduced one way to hijack a program's execution flaw, though I only showed you how to crash the program and left you with a little mystery to solv ...