Forwarded from DC8044 F33d
EE | OvertheWire Narnia Challenges 0-4 Writeups (Binary Exploitation) | https://0x00sec.org/t/overthewire-narnia-challenges-0-4-writeups-binary-exploitation-basics-with-explanations/18362
0x00sec - The Home of the Hacker
OverTheWire Narnia challenges 0-4 Writeups (Binary exploitation basics with explanations)
OverTheWire Narnia challenges 0-4 Writeups In this post I will be writing up challenges 0-4 from the Narnia series on OverTheWire, with the best explanation I can come up with for each, so someone that has no understanding of pwn, can get a base, and play…
Forwarded from Tsifrovoy
Forwarded from Codeby
Переполнение буфера и перезапись значения переменных - разработка эксплойтов, часть 1
Доброго времени суток. Решил написать цикл статей посвященный эксплуатации бинарных уязвимостей, в народе это называется чёрной магией. В сети есть куча статей и материалов на эту тему, а четкого пути так и не видно... Потому, что надо обладать огромным багажом знаний... Так как же научиться писать эксплойты? Находить 0дей уязвимости, обходить такие защиты, как DEP\ASLR?
Читать дальше: https://codeby.net/threads/perepolnenie-bufera-i-perezapis-znachenija-peremennyx-razrabotka-ehksplojtov-chast-1.67042/
#exploit
Доброго времени суток. Решил написать цикл статей посвященный эксплуатации бинарных уязвимостей, в народе это называется чёрной магией. В сети есть куча статей и материалов на эту тему, а четкого пути так и не видно... Потому, что надо обладать огромным багажом знаний... Так как же научиться писать эксплойты? Находить 0дей уязвимости, обходить такие защиты, как DEP\ASLR?
Читать дальше: https://codeby.net/threads/perepolnenie-bufera-i-perezapis-znachenija-peremennyx-razrabotka-ehksplojtov-chast-1.67042/
#exploit
Forwarded from Morgan
Развлекайтесь )
https://captf.com/practice-ctf/
https://unaalmes.hispasec.com/login
https://365.csaw.io/
https://defcon2018.ctfd.io/
https://ctf.hackucf.org/challenges
https://ctf.infosecinstitute.com/index.php
https://junior.stillhackinganyway.nl/home#challenge-information
https://challenges.re
https://angstromctf.com
https://3206.innotecsystem.com/home
https://hack.me
https://www.cipher-ctf.org/CaptureTheFlag.php
https://www.cybergamesuk.com/code-crackers
https://atenea.ccn-cert.cni.es/home
https://www.hackthebox.eu/
https://ctfs.me/
https://ctf365.com/
https://overthewire.org/wargames
https://www.hacking-lab.com/
https://www.picoctf.com
https://ctftime.org/
https://www.pentestit.ru/
https://shellterlabs.com/en/
https://ringzer0team.com/
https://challenges.ka0labs.org
https://www.sans.org/netwars/continuous/
https://www.sans.org/netwars/cybercity
https://www.vulnhub.com/
https://exploit-exercises.com
https://w3challs.com/
https://smashthestack.org/wargames.html
https://www.hackthissite.org/
https://www.pentesterlab.com/exercises/
https://www.root-me.org/
https://www.enigmagroup.org/
https://www.hackthis.co.uk/levels/
https://www.kioptrix.com/blog/test-page/
https://bright-shadows.net/
https://microcorruption.com/login
https://www.dvwa.co.uk/
https://www.owasp.org/index.php/Category:OWASP_WebGoat_Project
https://sourceforge.net/projects/metasploitable/
https://bitcoinchallenge.codes
https://backdoor.sdslabs.co
https://io.netgarage.org
https://ctf.hitcon.org
https://hackthis.co.uk. https://ctf.secadmin.es
https://uni.hctf.fun/pages/home
https://ctf-classic.ihacklabs.com/
https://captf.com/practice-ctf/
https://unaalmes.hispasec.com/login
https://365.csaw.io/
https://defcon2018.ctfd.io/
https://ctf.hackucf.org/challenges
https://ctf.infosecinstitute.com/index.php
https://junior.stillhackinganyway.nl/home#challenge-information
https://challenges.re
https://angstromctf.com
https://3206.innotecsystem.com/home
https://hack.me
https://www.cipher-ctf.org/CaptureTheFlag.php
https://www.cybergamesuk.com/code-crackers
https://atenea.ccn-cert.cni.es/home
https://www.hackthebox.eu/
https://ctfs.me/
https://ctf365.com/
https://overthewire.org/wargames
https://www.hacking-lab.com/
https://www.picoctf.com
https://ctftime.org/
https://www.pentestit.ru/
https://shellterlabs.com/en/
https://ringzer0team.com/
https://challenges.ka0labs.org
https://www.sans.org/netwars/continuous/
https://www.sans.org/netwars/cybercity
https://www.vulnhub.com/
https://exploit-exercises.com
https://w3challs.com/
https://smashthestack.org/wargames.html
https://www.hackthissite.org/
https://www.pentesterlab.com/exercises/
https://www.root-me.org/
https://www.enigmagroup.org/
https://www.hackthis.co.uk/levels/
https://www.kioptrix.com/blog/test-page/
https://bright-shadows.net/
https://microcorruption.com/login
https://www.dvwa.co.uk/
https://www.owasp.org/index.php/Category:OWASP_WebGoat_Project
https://sourceforge.net/projects/metasploitable/
https://bitcoinchallenge.codes
https://backdoor.sdslabs.co
https://io.netgarage.org
https://ctf.hitcon.org
https://hackthis.co.uk. https://ctf.secadmin.es
https://uni.hctf.fun/pages/home
https://ctf-classic.ihacklabs.com/
Forwarded from r0 Crew (Channel)
Reverse engineering 32 and 64 bits binaries with Radare2 series
Part 1: https://artik.blue/reversing-radare2-1
Part 2: https://artik.blue/reversing-radare2-2
Part 3 - funcs, cases and loops: https://artik.blue/reversing-radare-3
Part 4 - arrays and strings: https://artik.blue/reversing-radare-4
Part 4.II - more strings: https://artik.blue/reversing-radare-4-ii
Part 5 - var types and casting: https://artik.blue/reversing-radare-5
#reverse #radare2 #dukeBarman
Part 1: https://artik.blue/reversing-radare2-1
Part 2: https://artik.blue/reversing-radare2-2
Part 3 - funcs, cases and loops: https://artik.blue/reversing-radare-3
Part 4 - arrays and strings: https://artik.blue/reversing-radare-4
Part 4.II - more strings: https://artik.blue/reversing-radare-4-ii
Part 5 - var types and casting: https://artik.blue/reversing-radare-5
#reverse #radare2 #dukeBarman
Forwarded from r0 Crew (Channel)
Posts about Game Hacking by CaptnBanana https://twitter.com/CaptnBanana/status/1259226596331982849?s=19
Game Hacking #1: Developing Hacks for idTech3 Based Games https://bananamafia.dev/post/multihack/
Game Hacking #2: Coding A CS:GO Hack https://bananamafia.dev/post/bananabot/
#reverse #dukeBarman
Game Hacking #1: Developing Hacks for idTech3 Based Games https://bananamafia.dev/post/multihack/
Game Hacking #2: Coding A CS:GO Hack https://bananamafia.dev/post/bananabot/
#reverse #dukeBarman
Forwarded from white2hack 📚
EC_Council_CEH_v10_Complete_Training.pdf
60 MB
Друзья, по многочисленным просьбам для тех кто не смог найти гайд по лабам для курса CEH v.10 - выкладываю PDF отдельным файлом
Forwarded from white2hack 📚
EC-Council CEH v10_ Exam_[w2hack].pdf
2.6 MB
Вопросы с ответами к экзамену 312-50 по курсу CEH v.10
Forwarded from white2hack 📚
Видео лекции на английском языке для курса CEH v.10
https://mega.nz/#F!9QYkRCgC!qvSOMae3mHs_ykZBBbOLDg!oBg3mCrC
https://mega.nz/#F!9QYkRCgC!qvSOMae3mHs_ykZBBbOLDg!oBg3mCrC
Эксплойтинг для пентестеров - \OSCP\OSCE (Exploit-Dev) | XSS.is (ex DaMaGeLaB)
https://xss.is/threads/37258/
https://xss.is/threads/37258/
Linux (x86) Exploit Development Series – sploitF-U-N
https://sploitfun.wordpress.com/2015/06/26/linux-x86-exploit-development-tutorial-series/
https://sploitfun.wordpress.com/2015/06/26/linux-x86-exploit-development-tutorial-series/
sploitF-U-N
Linux (x86) Exploit Development Series
First of all I would like to thank phrack articles, its author and other security researchers for teaching me about different exploit techniques, without whom none of the posts would have been poss…
Статья - Luke, I am your fuzzer. Автоматизируем поиск уязвимостей в программах. | XSS.is (ex DaMaGeLaB)
https://xss.is/threads/29467/
https://xss.is/threads/29467/
XSS.is (ex DaMaGeLaB)
Статья - Luke, I am your fuzzer. Автоматизируем поиск уязвимостей...
Фаззинг все чаще применяют и программисты — для проверки своих приложений на прочность, и исследователи безопасности, и хакеры. Но пользоваться фаззерами не выйдет, если не понимаешь, что именно...
Forwarded from dukeBarman
@p1r0t3xn1k тут на днях вышло очень подробное видео https://www.youtube.com/watch?v=O3hb6HV1ZQo
YouTube
FUZZING FOR BEGINNERS (KUGG teaches STÖK American fuzzy lop)
In this episode of "STÖK, time to learn something new". KUGG (Christoffer Jerkeby) From F-Secure shows STÖK the basics of FUZZING using American Fuzzy lop. They FUZZ a HTTP server and get two crashes, crashes that with the right exploit could give an attacker…
Forwarded from r0 Crew (Bot, Bear0)
Exploit Development Student v1.7z.002
813.9 MB
#forward from @Razdva36