Hi everyone!In the previous part of this series we introduced remote code arbitrary execution via buffer overflows using all of our past experiences.As I said back then, today I'll be explaining the o ...
Hi everyone.Recently I've been studying some topics about Assembly, memory and exploitation, and thought I could write something nice, easy and fast about it, just because I like to share what I learn ...
Hi everyone!After messing around a little bit with IDA and Hopper disassemblers and briefly introducing you to memory, registers and Assembly, we are going to understand what happens when a process is ...
Hi everyone!Last time we explained what roles Ebp and Esp registers have. We first introduced function's stack frame building, return address and calling conventions, but left some of the concepts flo ...
Hi everyone!Last time we finished analyzing the assembly representation of our vulnerable piece of code (have I ever told you it is vulnerable?). This time we are going to introduce some fundaments ab ...