RE: Exploit writing tutorials
my ISP blocks ports below < 1024... so I figured 8800 would be the next bes=
t thing ...
@everybody : *always* be careful - port 80 will not make things safer than =
port 8800 ;)
____________________________________________________
Peter Van Eeckhoutte
peter.ve@corelan.be
____________________________________________________
My Blog : http://www.corelan.be:8800 (IPv4 and IPv6)
Twitter : http://www.twitter.com/corelanc0d3r
RIPE Handle PVE50-RIPE
a.k.a. c0d3r/c0d3rZ/corelanc0d3r on various forums
____________________________________________________
From: CAS CAS [mailto:cas-security@live.com]
Sent: donderdag 12 november 2009 21:42
To: Peter Van Eeckhoutte; bugtraq@securityfocus.com
Subject: RE: Exploit writing tutorials
Hey why are you publishing tutorials on port 8800?
Be carefull everybody
> From: peter.ve@corelan.be
> To: bugtraq@securityfocus.com
> Date: Tue, 10 Nov 2009 23:26:09 +0100
> Subject: Exploit writing tutorials
>
> Hi all,
>
> Just wanted to share the following links/tutorials on writing windows (st=
ack based) exploits :
>
> * Stack based overflows (direct RET overwrite) :
> (Tutorial Part 1)
> http://www.corelan.be:8800/index.php/2009/07/19/exploit-writing-tutorial-=
part-1-stack-based-overflows/
>
> * Jumping to shellcode :
> (Tutorial Part 2)
> http://www.corelan.be:8800/index.php/2009/07/23/writing-buffer-overflow-e=
xploits-a-quick-and-basic-tutorial-part-2/
>
> * Stack based overflows - SEH
> (Tutorial Part 3)
> http://www.corelan.be:8800/index.php/2009/07/25/writing-buffer-overflow-e=
xploits-a-quick-and-basic-tutorial-part-3-seh/
>
> * Stack based overflows - SEH part 2
> (Tutorial Part 3b)
> http://www.corelan.be:8800/index.php/2009/07/28/seh-based-exploit-writing=
-tutorial-continued-just-another-example-part-3b/
>
> * Writing Metasploit exploits
> (Tutorial Part 4)
> http://www.corelan.be:8800/index.php/2009/08/12/exploit-writing-tutorials=
-part-4-from-exploit-to-metasploit-the-basics/
>
> * Using debuggers to speed up exploit development
> (Tutorial Part 5)
> http://www.corelan.be:8800/index.php/2009/09/05/exploit-writing-tutorial-=
part-5-how-debugger-modules-plugins-can-speed-up-basic-exploit-development/
>
> * Bypassing Stack Cookies, Safeseh, NX/DEP and ASLR
> (Tutorial Part 6)
> http://www.corelan.be:8800/index.php/2009/09/21/exploit-writing-tutorial-=
part-6-bypassing-stack-cookies-safeseh-hw-dep-and-aslr/
>
> * Writing stack based unicode exploits
> (Tutorials Part 7)
> http://www.corelan.be:8800/index.php/2009/11/06/exploit-writing-tutorial-=
part-7-unicode-from-0x00410041-to-calc/
>
>
>
> ____________________________________________________
>
> Peter Van Eeckhoutte
> peter.ve@corelan.be
> ____________________________________________________
>
> My Blog : http://www.corelan.be:8800 (IPv4 and IPv6)
> Twitter : http://www.twitter.com/corelanc0d3r
> RIPE Handle PVE50-RIPE
> a.k.a. c0d3r/c0d3rZ/corelanc0d3r on various forums
> ____________________________________________________
>
>
>
> This transmission is intended only for use by the intended recipient(s). =
If you are not an intended recipient you should not read, disclose, copy, c=
irculate or in any other way use the information contained in this transmis=
sion. The information contained in this transmission may be confidential an=
d/or privileged. If you have received this transmission in error, please no=
tify the sender immediately and delete this transmission including any atta=
chments.
________________________________________
Hotmail: Trusted email with powerful SPAM protection. Sign up now.
This transmission is intended only for use by the intended recipient(s). I=
f you are not an intended recipient you should not read, disclose, copy, ci=
rculate or in any other way use the information contained in this transmiss=
ion. The information contained in this transmission may be confidential an=
d/or privileged. If you have received this transmission in error, please n=
otify the sender immediately and delete this transmission including any att=
achments.