Binary Exploitation Tutorial Logo

Binary Exploitation Tutorial

0
Free
Visit Website

This tutorial provides a comprehensive guide on modern exploitation techniques, focusing on understanding exploitation from scratch, including topics like memory layout of C programs, ELF binaries, stack overview during function calls, assembly code for function calls and returns, concept of $ebp and $esp, and executable memory. The tutorial also includes setting up the system using a vagrant file on a virtual box.

FEATURES

ALTERNATIVES

A cross-platform tool for creating malicious MS Office documents with hidden VBA macros and anti-analysis features.

A customized Kali Linux distribution for ICS/SCADA pentesting professionals

A collection of tests for Local File Inclusion (LFI) vulnerabilities using Burp Suite.

A standard for conducting penetration tests, covering seven main sections from planning to reporting.

A tool that checks expired domains for categorization/reputation and Archive.org history to determine good candidates for phishing and C2 domain names.

Modular framework for web services penetration testing with support for various attacks.

A blog post about abusing exported functions and exposed DCOM interfaces for pass-thru command execution and lateral movement

Collection of Windows oneliners for executing arbitrary code and downloading remote payloads.