Category: Reverse Engineering

Linux Binary Exploitation

BinExp: Linux Binary Exploitation

Linux Binary Exploitation Topics Lecture 1. Memory Layout of the C program. ELF binaries. Overview of the stack during the function call. Assembly code for the function call and return. The concept of $ebp and $esp. Executable...

smap

smap: Shellcode mapper

smap A handy tool for shellcode analysis. Demo video Requirements objdump Installation and execution Then you can download smap by cloning the Git repository:   get shellcodes http://shell-storm.org/shellcode/ https://www.exploit-db.com/shellcodes/ https://packetstormsecurity.com/files/tags/shellcode/ Copyright (C) 2016 s0cket7 Source: https://github.com/suraj-root/

Linux binary Exploitation

HITCON-Training for Linux binary Exploitation

HITCON-Training For Linux binary Exploitation Outline Basic Knowledge Introduction Reverse Engineering Static Analysis Dynamic Analysis Exploitation Useful Tool IDA PRO GDB Pwntool lab 1 – sysmagic Section Compile, linking, assembler Execution how program get...

exploitable

exploitable: The ‘exploitable’ GDB plugin

GDB ‘exploitable’ plugin The ‘exploitable’ plugin (exploitable/exploitable.py) ‘exploitable’ is a GDB extension that classifies Linux application bugs by severity. The extension inspects the state of a Linux application that has crashed and outputs a...