Infosec Blog
I like to do reverse engineering
ret2csu - A Return Oriented Programming Technique ret2csu - A Return Oriented Programming Technique
This is an in-depth guide on ret2csu technique. I tried to make this article as much detailed as I could, including refe
2020-04-13
ROP - ret2libc attack ROP - ret2libc attack
Today, I will show you how to use Return Oriented Programming for doing a ret2libc attack. ForewordThis is much more har
2019-07-29
ROP- Basic Exploit Creation ROP- Basic Exploit Creation
This blog post will teach you basics of ROP i.e. how to use tools efficilently. OverviewThis post is more practical, so
2019-07-26
Introduction to ROP Introduction to ROP
This blog post will let you know about the ROP or Return Oriented Programming. What is ROP?Return Oriented Programming
2019-07-24
Binary Exploitation - Format String + Buffer Overflow Vulnerability Binary Exploitation - Format String + Buffer Overflow Vulnerability
A detailed guide to use a format string vulnerability to bypass protections and use the buffer overflow vulnerability to
2018-09-12