Posts by Category

Binary Exploitation

ROP Emporium - callme (32 bit)

Solution for callme x32 from ROP Emporium

14 minute read

ROP Emporium - callme (64 bit)

Solution for callme x64 from ROP Emporium

14 minute read

ROP Emporium - split (64 bit)

Solution for split x64 from ROP Emporium

5 minute read

ROP Emporium - split (32 bit)

Solution for split x32 from ROP Emporium

5 minute read

ROP Emporium - ret2win

Solution for ret2win from ROP Emporium

6 minute read

protostar - stack 4

Solution for stack four from Protostar in Exploit Education Series

2 minute read

protostar - stack 3

Solution for stack three from Protostar in Exploit Education Series

2 minute read

protostar - stack 2

Solution for stack two from Protostar in Exploit Education Series

1 minute read

protostar - stack 1

Solution for stack one from Protostar in Exploit Education Series

2 minute read

protostar - stack 0

Solution for stack zero from Protostar in Exploit Education Series

1 minute read

phoenix - heap 1

Solution for heap one from Phoenix in Exploit Education Series

8 minute read

phoenix - heap 0

Solution for heap zero from Phoenix in Exploit Education Series

3 minute read

phoenix - format 4

Solution for format four from Phoenix in Exploit Education Series

7 minute read

phoenix - format 3

Solution for format three from Phoenix in Exploit Education Series

10 minute read

phoenix - format 2

Solution for format two from Phoenix in Exploit Education Series

6 minute read

phoenix - format 1

Solution for format one from Phoenix in Exploit Education Series

3 minute read

phoenix - format 0

Solution for format zero from Phoenix in Exploit Education Series

6 minute read

phoenix - stack 5

Solution for stack five from Phoenix in Exploit Education Series

5 minute read

phoenix - stack 4

Solution for stack four from Phoenix in Exploit Education Series

4 minute read

phoenix - stack 3

Solution for stack three from Phoenix in Exploit Education Series

3 minute read

phoenix - stack 2

Solution for stack two from Phoenix in Exploit Education Series

3 minute read

phoenix - stack 1

Solution for stack one from Phoenix in Exploit Education Series

4 minute read

phoenix - stack 0

Solution for stack zero from Phoenix in Exploit Education Series

4 minute read

Back to top ↑

HTB

Back to top ↑

Pwn

Back to top ↑

Exploit-Development

Vulnserver KSTET - Staged exploitation and Socket reusing

A simple walkthrough on Vulnserver KSTET using socket reusing and staged exploitation technique

9 minute read

Vulnserver GTER - Staged exploitation and Socket reusing

A simple walkthrough on Vulnserver GTER using socket reusing and staged exploitation technique

17 minute read

Vulnserver GTER - Staged exploitation and Egg hunting

A simple walkthrough on Vulnserver GTER using egg hunter and staged exploitation technique

13 minute read

Vulnserver LTER - Bypass Restricted Characters

A simple walkthrough on Vulnserver LTER using encoders to bypass restricted characters

15 minute read

Vulnserver HTER - EIP Overwrite with Character conversion

A simple walkthrough on Vulnserver HTER vanilla EIP overwrite

11 minute read

Vulnserver GMON - SEH Overflow & Stack Pivoting

A simple walkthrough on Vulnserver GMON SEH overflow with stack pivoting

5 minute read

Vulnserver GMON - SEH Overflow & Egg Hunting

A simple walkthrough on Vulnserver GMON SEH overflow & Egg hunting

14 minute read

Vulnserver TRUN - Stack Buffer Overflow

A simple walkthrough on Vulnserver TRUN stack buffer overflow

12 minute read

Vulnserver Setup - Prologue

A simple guide to set up Vulnserver and insight about user land memory

5 minute read

Back to top ↑

Windows-Exploitation

Vulnserver KSTET - Staged exploitation and Socket reusing

A simple walkthrough on Vulnserver KSTET using socket reusing and staged exploitation technique

9 minute read

Vulnserver GTER - Staged exploitation and Socket reusing

A simple walkthrough on Vulnserver GTER using socket reusing and staged exploitation technique

17 minute read

Vulnserver GTER - Staged exploitation and Egg hunting

A simple walkthrough on Vulnserver GTER using egg hunter and staged exploitation technique

13 minute read

Vulnserver LTER - Bypass Restricted Characters

A simple walkthrough on Vulnserver LTER using encoders to bypass restricted characters

15 minute read

Vulnserver HTER - EIP Overwrite with Character conversion

A simple walkthrough on Vulnserver HTER vanilla EIP overwrite

11 minute read

Vulnserver GMON - SEH Overflow & Stack Pivoting

A simple walkthrough on Vulnserver GMON SEH overflow with stack pivoting

5 minute read

Vulnserver GMON - SEH Overflow & Egg Hunting

A simple walkthrough on Vulnserver GMON SEH overflow & Egg hunting

14 minute read

Vulnserver TRUN - Stack Buffer Overflow

A simple walkthrough on Vulnserver TRUN stack buffer overflow

12 minute read

Vulnserver Setup - Prologue

A simple guide to set up Vulnserver and insight about user land memory

5 minute read

Back to top ↑

Vulnserver

Vulnserver KSTET - Staged exploitation and Socket reusing

A simple walkthrough on Vulnserver KSTET using socket reusing and staged exploitation technique

9 minute read

Vulnserver GTER - Staged exploitation and Socket reusing

A simple walkthrough on Vulnserver GTER using socket reusing and staged exploitation technique

17 minute read

Vulnserver GTER - Staged exploitation and Egg hunting

A simple walkthrough on Vulnserver GTER using egg hunter and staged exploitation technique

13 minute read

Vulnserver LTER - Bypass Restricted Characters

A simple walkthrough on Vulnserver LTER using encoders to bypass restricted characters

15 minute read

Vulnserver HTER - EIP Overwrite with Character conversion

A simple walkthrough on Vulnserver HTER vanilla EIP overwrite

11 minute read

Vulnserver GMON - SEH Overflow & Stack Pivoting

A simple walkthrough on Vulnserver GMON SEH overflow with stack pivoting

5 minute read

Vulnserver GMON - SEH Overflow & Egg Hunting

A simple walkthrough on Vulnserver GMON SEH overflow & Egg hunting

14 minute read

Vulnserver TRUN - Stack Buffer Overflow

A simple walkthrough on Vulnserver TRUN stack buffer overflow

12 minute read

Vulnserver Setup - Prologue

A simple guide to set up Vulnserver and insight about user land memory

5 minute read

Back to top ↑

Offsec

Back to top ↑

Exploit Development

Back to top ↑

Blog

Back to top ↑