Source Byte
7.8K subscribers
852 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
Tutorials on Linux red teaming basic techniques
Credits @linode

Exploitation: linode.com/docs/guides/linux…
Escalation: linode.com/docs/guides/linux…
Persistence: linode.com/docs/guides/linux…

#linux , #exploitation , #persistence , #escalation
Forwarded from Art of Engineering (Mohsen)
Name: Shellcoder's Handbook
Requirements: C, C++, Assembly
Level: Basics to Intermediate
Authors: Chris Anley, John Heasman, Felix "FX" Lindner, Gerardo Richarte

Chapters:
1- Before You Begin
2- Stack Overflows
3- Shellcode
4- Introduction to Format String Bugs
5- Introduction to Heap Overflows
6- The Wild World of Windows
7- Windows Shellcode
8- Windows Overflows
9- Overcoming Filters
10- Introduction to Solaris Exploitation
11- Advanced Solaris Exploitation
12- OS X Shellcode
13- Cisco IOS Exploitation
14- Protection Mechanisms
15- Establishing a Working Environment
16- Fault Injection
17- The Art of Fuzzing
18- Source Code Auditing
19- Instrumented Investigation: A Manual Approach
20- Tracing for Vulnerabilities
21- Binary Auditing
22- Alternative Payload Strategies
23- Writing Exploits that Work in the Wild
24- Attacking Database Software
25- Unix Kernel Overflows
26- Exploiting Unix Kernel Vulnerabilities
27- Hacking the Windows Kernel

#binary #exploitation #book #resource
Using Office VBA Macro to exploit a vulnerable driver (zam64.sys) using DeviceIoControl, to get NTAUTHORITY\SYSTEM

TL;DR - Ring 0 using Office Doc}

Credit: @0xDISREL

https://disrel.com/posts/Ring0VBA-Getting-Ring0-Using-a-Goddamn-Word-Document/

#driver , #exploitation, #VBA
exploiting a use-after-free in Linux kernel 5.15 (Ubuntu 22.04) (CVE-2022-32250)

credit: @saidelike

research.nccgroup.com/2022/0

#linux , #kernel , #analysis , #exploitation
__
@islemolecule_source
buffer overflow Mhtod.zip
2.7 MB
👍3
👍2🔥1
Forwarded from Infosec Fortress
Zhang Yunhai - BYPASS CONTROL FLOW GUARD COMPREHENSIVELY - Blackhat

#binary
#exploitation
———
🆔 @Infosec_Fortress
5👍3
Forwarded from Infosec Fortress
us-15-Zhang-Bypass-Control-Flow-Guard-Comprehensively-wp.pdf
425.2 KB
👍3👎1
Forwarded from Infosec Fortress
The Exploit Development Lifecycle

#exploitation
#conference
———
🆔 @Infosec_Fortress
👍31
Forwarded from Infosec Fortress
BSides-Cbr-24.pdf
83 MB
🔥3👍1
Forwarded from Infosec Fortress
Chrome Exploitation from Zero to Heap-Sandbox Escape

#browser
#exploitation
———
🆔 @Infosec_Fortress
👍21