Hello RST .. Today iam find some Tuts about EXPLOIT DEV , ======================= Windows Exploitation :- ======================= Windows Exploitation (Simple Stack Overflow) This video demos a simple stack overflow exploit. It gives some basic idea about the application that is being exploited, some idea about the exploit and demos how a debugger can be used to perform exploitation.
Windows Exploitation (Structured Exception Handler Based Exploitation) This video demos a Structured Exception Handler (SEH) stack overflow exploit. It gives some basic idea about the SEH structure in windows operating system. It explains the technique used to perform exploitation.
Windows Exploitation (Heap Spray_ASLR Bypass) This video demos a Heap Spray based stack overflow exploit. It gives some basic idea about the ASLR implemented in windows and explains how to use heap spray technique in exploiting activex components in IE7.
Windows Exploitation (Retn Oriented Programming) This video demos the Retn Oriented Programming (ROP) technique to call VirtualProtect method and allocates space on the stack to execute a payload. This technique is used to by pass the hardware Data Execution Prevention (DEP) technique implemented by windows operating system. Currently the video does not have sound, but a new video can be provided if people want it
Windows Exploitation (JMP back) This exploit shows an example of how to jump back into shellcode if the space after the control pointer is less than the payload's size
Windows Exploitation (SEH + ROP) This exploit shows how to combine SEH and ROP and in this ROP tutorial the voice is clear.
===================== ARM Exploitation :- ===================== ARM Exploitation (Simple Stack Overflow) This exploit describes a simple stack overflow that can be executed against an application on an iOS 5 device. This exploit teaches some basics of ARM architecture and demos a simple application that is used to demonstrate the procedure for exploiting the issue.
ARM Exploitation (Retn to LibC) This exploit describes a retn to libc exploit method to bypass the NX bit protection that is implemented on an iOS 5 device.
ARM Exploitation (ASLR BYPASS) This exploit describes a brute-force method to bypass the ASLR protection that is implemented on an iOS 5 device. This method is useful to exploit local security exploits and can be used to execute a payload that jailbreaks the device.
source : all tuts by : Tom India youtube : https://www.youtube.com/channel/UCpAvITj1kaW4esQX9wA3uNg/videos Regrads Mr . NYTRO : I HOPE TO MOVE ALL EXPLOIT TOPICS AT EXPLOIT DEV & R.E SECTION THAT WILL BE USEFUL THANKS