Jump to content
Nytro

Linux Exploit Writing

Recommended Posts

Posted

Packet Storm Security Linux Exploit Writing

Linux Exploit Writing Tutorial Part 1

Quote:

[TABLE=width: 100%]

[TR]

[TD=class: alt2] This whitepaper is the Linux Exploit Writing Tutorial Part 1 - Stack Overflows. [/TD]

[/TR]

[/TABLE]

Linux Exploit Writing Tutorial Part 2

Quote:

[TABLE=width: 100%]

[TR]

[TD=class: alt2] This whitepaper is the Linux Exploit Writing Tutorial Part 2 - Stack Overflow ASLR bypass using ret2reg instruction from vulnerable_1. [/TD]

[/TR]

[/TABLE]

Linux Exploit Writing Tutorial Part 3

Quote:

[TABLE=width: 100%]

[TR]

[TD=class: alt2] This whitepaper is the Linux Exploit Writing Tutorial Part 3 - ret2libc. [/TD]

[/TR]

[/TABLE]

Linux Exploit Development Part 2 Rev 2

Linux Exploit Writing Tutorial Part 3 Rev 2

Code:

Linux Exploit Writing Tutorial Part 1 ? Packet Storm

Linux Exploit Writing Tutorial Part 2 ? Packet Storm

Linux Exploit Development Part 2 Rev 2 ? Packet Storm

Linux Exploit Writing Tutorial Part 3 ? Packet Storm

Linux Exploit Writing Tutorial Part 3 Revision 2 ? Packet Storm

Sursa: EXETOOLS FORUM

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...