Building A Compact XOR Encoder
Author:
The majority of memory corruption exploits that exist, have some form of input character limitation. To get around these limitations, you have what is known as an encoder. By encoding the input ...
Read More
Author:
The majority of memory corruption exploits that exist, have some form of input character limitation. To get around these limitations, you have what is known as an encoder. By encoding the input ...
Author:
Recently I attended the three-day Corelan Advanced Exploit Development class in Sydney Australia. People had warned me beforehand, that the training is from 9am until 9pm, so I was aware...
Author:
Recently, I was interviewed by Housing Technology magazine, about what housing providers should be considering in the context of cyber-security and data protection. The full aricle can be ...
Author:
Its been a while since an update to conscan has been made since it’s initial release last October. The new update introduces two new features Username disclosureSingle threaded account brute-forcing...
Author:
BSides London 2014 last week was my first attempt at teaching an exploit development class a group of people which I had never met before. On the whole, the handson 1 hour workshop I ran on Stack Based ...
Author:
A whitepaper detailing various methods to bypass ASLR (Address Space Layout Randomization) when developing custom exploit code. This was originally an unpublished paper that I wrote for the Infosec ...