Автор: Peter Van Eeckhoutte (corelanc0d3r)
Список уроков:
- Exploit Writing Tutorial Part 1: Stack Based Overflows [Перевод: p(eaz]
- Exploit Writing Tutorial Part 2: Stack Based Overflows – jumping to shellcode [Перевод: p(eaz]
- Exploit Writing Tutorial Part 3: SEH Based Exploits [Перевод: p(eaz]
- Exploit Writing Tutorial Part 3b: SEH Based Exploits – just another example [Перевод: p(eaz]
- Exploit Writing Tutorial Part 4: From Exploit to Metasploit – The basics [Перевод: p(eaz]
- Exploit Writing Tutorial Part 5: How debugger modules & plugins can speed up basic exploit development [Перевод: p(eaz]
- Exploit Writing Tutorial Part 6: Bypassing Stack Cookies, SafeSeh, SEHOP, HW DEP and ASLR [Перевод: Prosper-H]
- Exploit Writing Tutorial Part 7: Unicode – from 0×00410041 to calc [Перевод: E-agle, demien]
- Exploit Writing Tutorial Part 8: Win32 Egg Hunting [Перевод: Prosper-H]
- Exploit Writing Tutorial Part 9: Introduction to Win32 shellcoding [Перевод: gavz]
- Exploit Writing Tutorial Part 10: Chaining DEP with ROP – the Rubik’s[TM] Cube [Перевод: gavz]
- Exploit Writing Tutorial Part 11: Heap Spraying
Другие статьи на тему эксплойтов:
- Starting to write Immunity Debugger PyCommands: my cheatsheet (Перевод: dahaka)
- QuickZip Stack BOF 0day (Part I): a box of chocolates
- QuickZip Stack BOF 0day (Part 2): A box of chocolates – part 2
- Ken Ward Zipper: Exploit write-up on abysssec.com
- Ken Ward Zipper: Taking advantage of payload conversion
- Hack Notes: ROP retn+offset and impact on stack setup
- Hack Notes: Ropping eggs for breakfast
- Universal DEP/ASLR bypass with msvcr71.dll and mona.py
- WoW64 Egghunter
- Debugging Fun – Putting a process to sleep()
- Jingle BOFs, Jingle ROPs, Sploiting all the things… with Mona v2 !!
- Root Cause Analysis – Memory Corruption Vulnerabilities
- Heap Layout Visualization with mona.py and WinDBG
- DEPS – Precise Heap Spray on Firefox and IE10
В переводе приняли участие:



Reply With Quote
Thanks

