----
Advanced Exploitation: How to Find & Write a Buffer Overflow Exploit for a Network Service
// Null Byte « WonderHowTo
While our time with the Protostar VM from Exploit Exercises was lovely, we must move on to bigger things and harder challenges. Exploit Exercises' Fusion VM offers some more challenging binary exploitation levels for us to tackle. The biggest change is that these levels are all network services, which means we'll write our first remote exploits. In this guide on advanced exploitation techniques in our Exploit Development series, we'll take a look at the first level in the GNU debugger (GDB), write an exploit, and prepare for bigger challenges. Performing some code analysis will be the... more
----
Read in my feedly
No comments:
Post a Comment