nullbyte.png

Exploit Building

Article cover image
Jul 2, 2015

Welcome back, my hacker novitiates!In the previous two posts in this series, we looked at the basics of buffer overflows. In this post, we will look at one technique for finding buffer overflows. We w ...

Article cover image
Jan 9, 2015

Welcome back, my amateur hackers!Over the course of the next year, we will be developing our own zero-day exploits. In my first article in this series, I introduced you to buffer overflows, which are ...

Article cover image
Dec 16, 2014

Welcome back, my fledgling hackers!With this first article, I am initiating a new series intended to convey to my readers the skills necessary to develop your own exploits.As many of you know, soon af ...