Binary Exploitation 101 - ret2dlresolve
This blog series is still a work in progress. The content may change without notice. In this chapter, we’ll learn about ret2dlresolve. The materials for this chapter can be found in the chapter_0...
This blog series is still a work in progress. The content may change without notice. In this chapter, we’ll learn about ret2dlresolve. The materials for this chapter can be found in the chapter_0...
This blog series is still a work in progress. The content may change without notice. In this chapter, we’ll learn about FSA (Format String Attack) and GOT (Global Offset Table) overwrite, along w...
This blog series is still a work in progress. The content may change without notice. In this chapter, we’ll learn about ASLR (Address Space Layout Randomization) and its bypass. The materials for...
This blog series is still a work in progress. The content may change without notice. In this chapter, we’ll learn about SSP (Stack Smashing Protector) and its bypass. The materials for this chapt...
This blog series is still a work in progress. The content may change without notice. In this chapter, we’ll learn about NX (No eXecute) bit and its bypass technique, ROP (Return-Oriented Programm...
This blog series is still a work in progress. The content may change without notice. In this chapter, we’ll learn how system calls work and shellcode. The materials for this chapter can be found ...
This blog series is still a work in progress. The content may change without notice. In this chapter, we’ll learn how function calls work and buffer overflow. The materials for this chapter can b...
This blog series is still a work in progress. The content may change without notice. In this chapter, we’ll learn how a C program is converted into an executable file, the structure of ELF, memor...
This blog series is still a work in progress. The content may change without notice. Welcome to my blog series “Binary Exploitation 101”! In this series, you will learn how programs actually work...
This blog series is still a work in progress. The content may change without notice. Introduction Four years ago, I came across a book called Hacking: The Art of Exploitation by Jon Erickson1. S...