System Hacking

1.Background : Computer Architecture

post-thumbnail

2.Background : Linux Memory Layout

post-thumbnail

3.x86 Assembly : Essential Part(1)

post-thumbnail

4.x86 Assembly : Essential Part(2)

post-thumbnail

5.Tool : gdb

post-thumbnail

6.Exploit Tech : Shellcode - orw

post-thumbnail

7.Exploit Tech : Shellcode - execve

post-thumbnail

8.Tool : pwntools

post-thumbnail

9.Background : Calling Convention

post-thumbnail

10.Memory Corruption : Stack Buffer Overflow

post-thumbnail

11.Mitigation : Stack Canary

post-thumbnail

12.Exploit Tech : Return to Shellcode

post-thumbnail

13.Mitigation : NX & ASLR

post-thumbnail

14.Background : Library

post-thumbnail

15.Exploit Tech : Return to Library

post-thumbnail

16.Exploit Tech : Return Oriented Programming

post-thumbnail

17.Background : RELRO

post-thumbnail

18.Background : PIE

post-thumbnail

19.Exploit Tech : Hook Overwrite

post-thumbnail

20.Memory Corruption : Out of Bounds

post-thumbnail

21.Exploit Tech : Format String Bug

post-thumbnail

22.Memory Corruption : Use After Free

post-thumbnail

23.Background : ptmalloc2

post-thumbnail

24.Memory Corruption : Double Free Bug

post-thumbnail

25.Exploit Tech: Use After Free

post-thumbnail

26.DreamHack - System Hacking (진행중)

post-thumbnail

27.System Hacking - 유용한 모음집

post-thumbnail