This is a quick writeup of the TShark room of tryhackme.com. TShark TShark is a network p...
Here is the writeup for the room Investigating Windows 2.0. This room is the continuation of Investi...
In this exercise we'll hack control flow by rewriting pc, making it point to the hello wold shellcode...
Lets transform the hello world code we wrote in the previous blog entry into a shellcode. To remove...
ARM architecture was originally designed for an Acorn computer and meant Acorn Risc Machine. It has t...
In this article, we'll rewrite the pc register to take control of the program flow. This can be done...
In this episode of the ProtoARM series, we'll exploit a vulnerable program to change the 'normal' con...
This is our source code for the third exploit of this series on ARM hacking: #include <stdlib.h...
In this second protoarm exercise, we'll exploit a buffer overflow to write arbitary data onto the sta...
Let's get started with binary exploitation on ARM systems. This challenge is based on the 'protostar'...
Analysis root@protostar:/opt/protostar/bin# file stack5 stack5: setuid ELF 32-bit LSB e...
This is the 5th exercise of the protostar series. This is about exploiting a buffer overflow to rewri...
Protostar - stack3 In this third exercice of our series, we'll modify call flow of the pro...
Protostar - stack2 In stack0 our user input came from standard input via the gets function...
Last time we discovered how bad can stack overflows be. This presents another way for the user to inj...
Let's discover stack-based buffer overflows with the first Protostar challenge: stack0. Here is the...