Jump to content
NO-MERCY

Windows and ARM Exploitation (EN)

Recommended Posts

Hello RST ..

Today iam find some Tuts about EXPLOIT DEV ,

=======================

Windows Exploitation :-

=======================

Windows Exploitation (Simple Stack Overflow)

This video demos a simple stack overflow exploit. It gives some basic idea about the application that is being exploited, some idea about the exploit and demos how a debugger can be used to perform exploitation.

Windows Exploitation (Structured Exception Handler Based Exploitation)

This video demos a Structured Exception Handler (SEH) stack overflow exploit. It gives some basic idea about the SEH structure in windows operating system. It explains the technique used to perform exploitation.

Windows Exploitation (Heap Spray_ASLR Bypass)

This video demos a Heap Spray based stack overflow exploit. It gives some basic idea about the ASLR implemented in windows and explains how to use heap spray technique in exploiting activex components in IE7.

Windows Exploitation (Retn Oriented Programming)

This video demos the Retn Oriented Programming (ROP) technique to call VirtualProtect method and allocates space on the stack to execute a payload. This technique is used to by pass the hardware Data Execution Prevention (DEP) technique implemented by windows operating system. Currently the video does not have sound, but a new video can be provided if people want it

Windows Exploitation (JMP back)

This exploit shows an example of how to jump back into shellcode if the space after the control pointer is less than the payload's size

Windows Exploitation (SEH + ROP)

This exploit shows how to combine SEH and ROP and in this ROP tutorial the voice is clear.

=====================

ARM Exploitation :-

=====================

ARM Exploitation (Simple Stack Overflow)

This exploit describes a simple stack overflow that can be executed against an application on an iOS 5 device. This exploit teaches some basics of ARM architecture and demos a simple application that is used to demonstrate the procedure for exploiting the issue.

ARM Exploitation (Retn to LibC)

This exploit describes a retn to libc exploit method to bypass the NX bit protection that is implemented on an iOS 5 device.

ARM Exploitation (ASLR BYPASS)

This exploit describes a brute-force method to bypass the ASLR protection that is implemented on an iOS 5 device. This method is useful to exploit local security exploits and can be used to execute a payload that jailbreaks the device.

source :

all tuts by : Tom India

youtube : https://www.youtube.com/channel/UCpAvITj1kaW4esQX9wA3uNg/videos

Regrads

Mr . NYTRO :

I HOPE TO MOVE ALL EXPLOIT TOPICS AT EXPLOIT DEV & R.E SECTION

THAT WILL BE USEFUL

THANKS

Edited by NO-MERCY
&
  • Upvote 1
Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...