Binary Exploitation Tutorial Logo

Binary Exploitation Tutorial

0
Free
Visit Website

This tutorial provides a comprehensive guide on modern exploitation techniques, focusing on understanding exploitation from scratch, including topics like memory layout of C programs, ELF binaries, stack overview during function calls, assembly code for function calls and returns, concept of $ebp and $esp, and executable memory. The tutorial also includes setting up the system using a vagrant file on a virtual box.

FEATURES

ALTERNATIVES

RTA provides a framework of scripts for blue teams to test detection capabilities against malicious tradecraft, modeled after MITRE ATT&CK.

A blog post about abusing exported functions and exposed DCOM interfaces for pass-thru command execution and lateral movement

A tutorial on how to use Apache mod_rewrite to randomly serve payloads in phishing attacks

Advanced command and control tool for red teaming and adversary simulation with extensive features and evasion capabilities.

A C/C++ tool for remote process injection, supporting x64 and x86 operations, with system call macros generated by SysWhispers script.

A post-exploitation framework for attacking running AWS infrastructure

Python utility for testing the existence of domain names under different TLDs to find malicious subdomains.

A web application security testing platform that combines manual and automated testing tools for conducting comprehensive security assessments and penetration testing.

PINNED