Tutorials on Linux red teaming basic techniques
Credits @linode
Exploitation: linode.com/docs/guides/linux…
Escalation: linode.com/docs/guides/linux…
Persistence: linode.com/docs/guides/linux…
#linux , #exploitation , #persistence , #escalation
Credits @linode
Exploitation: linode.com/docs/guides/linux…
Escalation: linode.com/docs/guides/linux…
Persistence: linode.com/docs/guides/linux…
#linux , #exploitation , #persistence , #escalation
Heap exploit series by Ch0pin
۱− infosecwriteups.com/the-todd…
۲− infosecwriteups.com/the-todd…
۳− infosecwriteups.com/the-todd…
۴− infosecwriteups.com/the-todd…
۵− infosecwriteups.com/the-todd…
۶− infosecwriteups.com/the-todd…
۷− infosecwriteups.com/the-todd…
۸− infosecwriteups.com/the-todd…
۹− infosecwriteups.com/the-todd…
#heap , #exploitation
۱− infosecwriteups.com/the-todd…
۲− infosecwriteups.com/the-todd…
۳− infosecwriteups.com/the-todd…
۴− infosecwriteups.com/the-todd…
۵− infosecwriteups.com/the-todd…
۶− infosecwriteups.com/the-todd…
۷− infosecwriteups.com/the-todd…
۸− infosecwriteups.com/the-todd…
۹− infosecwriteups.com/the-todd…
#heap , #exploitation
Forwarded from Art of Engineering (Mohsen)
Name: Shellcoder's Handbook
Requirements: C, C++, Assembly
Level: Basics to Intermediate
Authors: Chris Anley, John Heasman, Felix "FX" Lindner, Gerardo Richarte
Chapters:
1- Before You Begin
2- Stack Overflows
3- Shellcode
4- Introduction to Format String Bugs
5- Introduction to Heap Overflows
6- The Wild World of Windows
7- Windows Shellcode
8- Windows Overflows
9- Overcoming Filters
10- Introduction to Solaris Exploitation
11- Advanced Solaris Exploitation
12- OS X Shellcode
13- Cisco IOS Exploitation
14- Protection Mechanisms
15- Establishing a Working Environment
16- Fault Injection
17- The Art of Fuzzing
18- Source Code Auditing
19- Instrumented Investigation: A Manual Approach
20- Tracing for Vulnerabilities
21- Binary Auditing
22- Alternative Payload Strategies
23- Writing Exploits that Work in the Wild
24- Attacking Database Software
25- Unix Kernel Overflows
26- Exploiting Unix Kernel Vulnerabilities
27- Hacking the Windows Kernel
#binary #exploitation #book #resource
Requirements: C, C++, Assembly
Level: Basics to Intermediate
Authors: Chris Anley, John Heasman, Felix "FX" Lindner, Gerardo Richarte
Chapters:
1- Before You Begin
2- Stack Overflows
3- Shellcode
4- Introduction to Format String Bugs
5- Introduction to Heap Overflows
6- The Wild World of Windows
7- Windows Shellcode
8- Windows Overflows
9- Overcoming Filters
10- Introduction to Solaris Exploitation
11- Advanced Solaris Exploitation
12- OS X Shellcode
13- Cisco IOS Exploitation
14- Protection Mechanisms
15- Establishing a Working Environment
16- Fault Injection
17- The Art of Fuzzing
18- Source Code Auditing
19- Instrumented Investigation: A Manual Approach
20- Tracing for Vulnerabilities
21- Binary Auditing
22- Alternative Payload Strategies
23- Writing Exploits that Work in the Wild
24- Attacking Database Software
25- Unix Kernel Overflows
26- Exploiting Unix Kernel Vulnerabilities
27- Hacking the Windows Kernel
#binary #exploitation #book #resource
Using Office VBA Macro to exploit a vulnerable driver (zam64.sys) using DeviceIoControl, to get NTAUTHORITY\SYSTEM
TL;DR - Ring 0 using Office Doc}
Credit: @0xDISREL
https://disrel.com/posts/Ring0VBA-Getting-Ring0-Using-a-Goddamn-Word-Document/
#driver , #exploitation, #VBA
TL;DR - Ring 0 using Office Doc}
Credit: @0xDISREL
https://disrel.com/posts/Ring0VBA-Getting-Ring0-Using-a-Goddamn-Word-Document/
#driver , #exploitation, #VBA
exploiting a use-after-free in Linux kernel 5.15 (Ubuntu 22.04) (CVE-2022-32250)
credit: @saidelike
research.nccgroup.com/2022/0…
#linux , #kernel , #analysis , #exploitation
__
@islemolecule_source
credit: @saidelike
research.nccgroup.com/2022/0…
#linux , #kernel , #analysis , #exploitation
__
@islemolecule_source
A Deep Dive Into Exploiting Windows Thread Pools
https://urien.gitbook.io/diago-lima/a-deep-dive-into-exploiting-windows-thread-pools
#window_internals , #exploitation
https://urien.gitbook.io/diago-lima/a-deep-dive-into-exploiting-windows-thread-pools
#window_internals , #exploitation
👍2🔥1
Forwarded from Infosec Fortress
Zhang Yunhai - BYPASS CONTROL FLOW GUARD COMPREHENSIVELY - Blackhat
#binary
#exploitation
———
🆔 @Infosec_Fortress
#binary
#exploitation
———
🆔 @Infosec_Fortress
❤5👍3