Usr6 Posted September 28, 2013 Report Posted September 28, 2013 Windows Exploit Development Tutorial SeriesPart 1: Introduction to Exploit DevelopmentPart 2: Saved Return Pointer OverflowsPart 3: Structured Exception Handler (SEH)Part 4: Egg HuntersPart 5: Unicode 0x00410041Part 6: Writing W32 shellcodePart 7: Return Oriented ProgrammingPart 8: Spraying the Heap [Chapter 1: Vanilla EIP]Part 9: Spraying the Heap [Chapter 2: Use-After-Free]Linux Exploit Development Tutorial SeriesPart 1: Introduction to Linux Exploit DevelopmentPart 2: Linux Format String Exploitation 1 Quote
AlMalalah Posted September 28, 2013 Report Posted September 28, 2013 Multumesc !Tare as vrea sa vad tot asa niste tutoriale pas-cu-pas pentru API hooking, API detouring etc. Poate face cineva care stie...Multumesc anticipat ! Quote
neox Posted September 29, 2013 Report Posted September 29, 2013 (edited) Multumesc !Tare as vrea sa vad tot asa niste tutoriale pas-cu-pas pentru API hooking, API detouring etc. Poate face cineva care stie...Multumesc anticipat !Ca sa se faca tutoriale API hooking, API detouring trebuie stiut c++ dar bine deci nu vrajala specializare in asa ceva, si ASM bine de tot .Asa numai sa faci tutorial si sa primesti like dar multi inteleg nu are rost pentru ca ai vazut si in postul lui M2G cu cartea C toti au votat, si nimieni pe urma la invatat.https://rstforums.com/forum/75109-rsta-avem-cu-cine.rstDeci sa explici API hooking, API detouring subiectele de mai jos nu are rost daca nu se stie c++ si asmFunctii care creeaza noi procese CreateProcess CreateProcessAsUser CreateProcessWithLogonWFunctii ca fisierele de acces CreateFile [de asemenea, utilizat pentru a deschide] CreateFile2 CreateDirectory CopyFile DeleteFile FindFirstFile FindNextFile MoveFile OpenFileFunctii, lista proceselor NtQuerySystemInformation Process32First Process32NextPentru distractie MessageBoxA MessageBoxWTare tipul b33f si pagina lui a fost aceptat in team offensive security se ocupa de pwb administratie Edited September 29, 2013 by neox Quote