This section contains articles exploring the theory, concepts, and defensive implications of modern software exploitation techniques across multiple architectures and operating systems. Each article breaks down how particular vulnerability classes work, and how an adversary would typically abuse them.
- SigReturn ROPUsing sigreturn() to execute code.
- x64 GOT Pointer LeakageLeaking pointers from the Global Offset Table.
- Source Code AuditingPerforming static analysis of Python & Java code.
- Directory JunctionsExploiting Directory Junctions for local privilege escalation.
- Integer SecurityCommon security issues with integer variables.
- Linux x64 Reverse ShellcodeReverse shells in x64 assembly.
- Position Independent ExecutablesExploiting PIE enabled executables.
- Execve ShellcodeExecuting the execve syscall on x64 Linux using Shellcode.
- ARM64 ROP ChainingPerforming a Return-to-libc attack on ARM64 systems.
- x64 MPROTECT ROPCalling mprotect on x64 Linux.
- MIPS32 Buffer OverflowsExploiting memory corruption vulnerabilities on MIPS32 systems.
- LD_PRELOAD ExploitationUsing LD_PRELOAD for dynamic function hooking and privilege escalation.
- Cyber Apocalypse 2023Cyber Apocalypse CTF 2023 challenge writeups.
- Windows x64 Reverse ShellcodeReverse shells in x64 assembly.
- Windows x64 Shellcode DevelopmentWriting Shellcode for Windows 11.
- Fuzzing Network ProtocolsFuzzing Network Protocols with the BooFuzz Python library.
- Fuzzing with AFL++File format fuzzing with American Fuzzy Lop++.
- Reverse Engineering Network ProtocolsAnalysing Network Protocols to identify vulnerabilities.
- Use After Free VulnerabilitiesExploiting use-after-free vulnerabilities.
- Heap Exploitation: The House of ForceTampering with the top chunk size field for an arbitrary write primitive.
- Ubuntu 20.04 Heap ExploitationExploiting heap corruption on Ubuntu 20.04.
- Heap Thread Cache ExploitationExploiting heap thread caching on glibc 2.26.
- Heap Fastbin ExploitationDouble free exploitation of glibc heap fastbins.
- Dealing with Small Buffer SpaceUsing relative JMP instructions to escape small buffers.
- 64-Bit Return-to-libc AttacksBypassing NX on 64-bit Linux.
- Bypassing DEP & ASLR in LinuxBypassing DEP & ASLR using pointer leakage and return orientated programming.
- Format String ExploitationA quick tutorial on exploiting format string vulnerabilities to read and write memory.