Vitali Kremez
  • Home
  • About
  • Contact
  • Cyber Security
  • Cyber Intel
  • Programming
  • Reverse Engineering
  • Exploit Development
  • Penetration Test
  • WIN32 Assembly
  • On Writing
    • Blog
    • LSAT
    • Photo
  • Honeypot
  • Forum

Exploit development

Software Exploitation in Windows Environment

9/12/2016

0 Comments

 
Source: OpenSecurityTraining.info
Part 1

​Fuzzing and crash dump analysis
From crash dump to working exploit lab in WinDBG
Picture
Here  is  a  very  basic  program  to  help  us  explore  our  exploit  environment.  The  
basic_vuln  program  reads  in  a  binary  file  and  displays  the  first  64  hexadecimal  
bytes  from  that  file.  The  program  prints  various  meta  data  such  as  the  location  of  
variables  and  functions  in  the  process  address  space.  This  meta  information  will  
help  simplify  the  exploitation  process  as  we  are  learning.  
Picture

Read More
0 Comments

    Author

    Vitali Kremez

    Archives

    September 2016
    July 2016
    June 2016
    May 2016

    Categories

    All

    RSS Feed

Powered by Create your own unique website with customizable templates.
  • Home
  • About
  • Contact
  • Cyber Security
  • Cyber Intel
  • Programming
  • Reverse Engineering
  • Exploit Development
  • Penetration Test
  • WIN32 Assembly
  • On Writing
    • Blog
    • LSAT
    • Photo
  • Honeypot
  • Forum