RE: Exploit writing tutorials

看板Bugtraq作者時間16年前 (2009/11/13 06:01), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串1/1
my ISP blocks ports below < 1024... so I figured 8800 would be the next bes= t thing ... @everybody : *always* be careful - port 80 will not make things safer than = port 8800 ;) ____________________________________________________ Peter Van Eeckhoutte peter.ve@corelan.be ____________________________________________________ My Blog : http://www.corelan.be:8800 (IPv4 and IPv6) Twitter : http://www.twitter.com/corelanc0d3r RIPE Handle PVE50-RIPE a.k.a. c0d3r/c0d3rZ/corelanc0d3r on various forums ____________________________________________________ From: CAS CAS [mailto:cas-security@live.com] Sent: donderdag 12 november 2009 21:42 To: Peter Van Eeckhoutte; bugtraq@securityfocus.com Subject: RE: Exploit writing tutorials Hey why are you publishing tutorials on port 8800? Be carefull everybody > From: peter.ve@corelan.be > To: bugtraq@securityfocus.com > Date: Tue, 10 Nov 2009 23:26:09 +0100 > Subject: Exploit writing tutorials > > Hi all, > > Just wanted to share the following links/tutorials on writing windows (st= ack based) exploits : > > * Stack based overflows (direct RET overwrite) : > (Tutorial Part 1) > http://www.corelan.be:8800/index.php/2009/07/19/exploit-writing-tutorial-= part-1-stack-based-overflows/ > > * Jumping to shellcode : > (Tutorial Part 2) > http://www.corelan.be:8800/index.php/2009/07/23/writing-buffer-overflow-e= xploits-a-quick-and-basic-tutorial-part-2/ > > * Stack based overflows - SEH > (Tutorial Part 3) > http://www.corelan.be:8800/index.php/2009/07/25/writing-buffer-overflow-e= xploits-a-quick-and-basic-tutorial-part-3-seh/ > > * Stack based overflows - SEH part 2 > (Tutorial Part 3b) > http://www.corelan.be:8800/index.php/2009/07/28/seh-based-exploit-writing= -tutorial-continued-just-another-example-part-3b/ > > * Writing Metasploit exploits > (Tutorial Part 4) > http://www.corelan.be:8800/index.php/2009/08/12/exploit-writing-tutorials= -part-4-from-exploit-to-metasploit-the-basics/ > > * Using debuggers to speed up exploit development > (Tutorial Part 5) > http://www.corelan.be:8800/index.php/2009/09/05/exploit-writing-tutorial-= part-5-how-debugger-modules-plugins-can-speed-up-basic-exploit-development/ > > * Bypassing Stack Cookies, Safeseh, NX/DEP and ASLR > (Tutorial Part 6) > http://www.corelan.be:8800/index.php/2009/09/21/exploit-writing-tutorial-= part-6-bypassing-stack-cookies-safeseh-hw-dep-and-aslr/ > > * Writing stack based unicode exploits > (Tutorials Part 7) > http://www.corelan.be:8800/index.php/2009/11/06/exploit-writing-tutorial-= part-7-unicode-from-0x00410041-to-calc/ > > > > ____________________________________________________ > > Peter Van Eeckhoutte > peter.ve@corelan.be > ____________________________________________________ > > My Blog : http://www.corelan.be:8800 (IPv4 and IPv6) > Twitter : http://www.twitter.com/corelanc0d3r > RIPE Handle PVE50-RIPE > a.k.a. c0d3r/c0d3rZ/corelanc0d3r on various forums > ____________________________________________________ > > > > This transmission is intended only for use by the intended recipient(s). = If you are not an intended recipient you should not read, disclose, copy, c= irculate or in any other way use the information contained in this transmis= sion. The information contained in this transmission may be confidential an= d/or privileged. If you have received this transmission in error, please no= tify the sender immediately and delete this transmission including any atta= chments. ________________________________________ Hotmail: Trusted email with powerful SPAM protection. Sign up now. This transmission is intended only for use by the intended recipient(s). I= f you are not an intended recipient you should not read, disclose, copy, ci= rculate or in any other way use the information contained in this transmiss= ion. The information contained in this transmission may be confidential an= d/or privileged. If you have received this transmission in error, please n= otify the sender immediately and delete this transmission including any att= achments.
文章代碼(AID): #1A_8MUeq (Bugtraq)