Recent Posts

  • Samba Server Exploitation January 17, 2018
  • GDB Tutorial January 16, 2018
  • Hacking Samba on Ubuntu and Installing the Meterpreter January 16, 2018
Prepare for Offensive Security Certified Professional
pentester@tonyng.net  
    Menu
    • Article
    • Industry News for IT Security
    • OSCP
      • OSCP Official Complete Guide
      • OSCP Exp. Sharing
    • Wifi Hacking
    • Online Resources
    • Lab
    • Must Try
    • Vulnerability Database
    • Skills
      • Buffer Overflow
      • Privilege Escalation
      • Null Session
      • SSH

    objdump

    Home / Tag: objdump
    Buffer Overflow Exploit
    16 Nov

    Buffer Overflow Exploit

    • Pentester
    • Buffer Overflow
    • Tags: Buffer Overflow, C functions vulnerable, memory layout, objdump
    • no comments

      Introduction I am interested in exploiting binary files. The first time I came across the buffer overflow exploit, I couldn’t actually implement it. Many of the existing sources on the web were outdated(worked with earlier versions of gcc, linux, etc). It took me quite a while to actually run a vulnerable program on my machine and […]

    read more »

    Site Categories

    • Article (15)
    • Backdoor (1)
    • Buffer Overflow (16)
    • Case Studies (2)
    • Cheat Sheet (6)
    • ColdFusion (6)
    • Lab (6)
    • Metasploit (7)
    • Must Try (2)
    • Netcat (1)
    • Null Session (5)
    • Online Resources (2)
    • OS Fingerprinting (1)
    • OSCP Exp. Sharing (8)
    • Payloads (4)
    • Privilege Escalation (14)
    • RFI and LFI (2)
    • Samba / SMB (3)
    • Skills (63)
    • SQL Injection (4)
    • SSH (5)
    • Uncategorized (2)
    • Vulnerability Database (5)
    • Wifi Hacking (2)

    Tag Cloud

    445 airodump-ng APSB09-09 authentication bypass Buffer Overflow burp bypassuac cfm shell C functions vulnerable data breach fckeditor getsystem getuid google kali kali wifi hack Linux Privilege Escalation memory corruption memory layout metasploit Meterpreter meterpreter command mitm MS08_067 ms11-080 msfvenom null session oscp oscp exp sharing Privilege Escalation ps psexec pyinstaller pywin32 rpcclient shellcode smb stack steal_token systeminfo UAC bypass union injections wifi hacking wifiphisher wmic
    Copyright © 2017 pentest.tonyng.net. All rights reserved.
      Scroll