Page 1 of 5 123 ... LastLast
Results 1 to 10 of 42

Thread: Writing Buffer Overflow Exploits using BackTrack

  1. #1
    Super Moderator lupin's Avatar
    Join Date
    Jan 2010
    Posts
    2,943

    Default Writing Buffer Overflow Exploits using BackTrack

    I have been writing a number of tutorials on my blog about how to create buffer overflow exploits using BackTrack.

    I posted the links to parts one and two on the old forums, and I just finished part three, so I decided to post links to all three parts here.

    I will update this post with more links when I write further entries.

    Part One: A Simple Windows Stack Based Buffer Overflow
    Part Two: A Windows Stack Based SEH Buffer Overflow
    Part Three: A Windows Stack Based SEH Buffer Overflow with Character Translation
    Part Four: A Windows Use After Free Heap Corruption Exploit
    Part Five: A Windows Stack Based Overflow using an Egghunter and a Conditional Jump


    Update: Added link to part four.
    Update: Added link to part five.
    Last edited by lupin; 02-13-2010 at 02:12 PM.
    Capitalisation is important. It's the difference between "Helping your brother Jack off a horse" and "Helping your brother jack off a horse".

    The Forum Rules, Forum FAQ and the BackTrack Wiki... learn them, love them, live them.

  2. #2
    Junior Member
    Join Date
    Jan 2010
    Posts
    84

    Default Re: Writing Buffer Overflow Exploits using BackTrack

    Great

    Thanks for ur hardwork

  3. #3
    Junior Member
    Join Date
    Jan 2010
    Posts
    41

    Default Re: Writing Buffer Overflow Exploits using BackTrack

    Super Thanks !

  4. #4
    Just burned his ISO
    Join Date
    Jan 2010
    Location
    /var/tmp because /dev/null is always full
    Posts
    5

    Default Re: Writing Buffer Overflow Exploits using BackTrack

    Awesome Tutorials.

    Thanks, I hope your efforts are recognised

  5. #5
    Just burned his ISO
    Join Date
    Jan 2010
    Posts
    1

    Thumbs up Re: Writing Buffer Overflow Exploits using BackTrack

    Very nice! Easy to understand and very well presented. I like your style.

  6. #6
    Junior Member
    Join Date
    Jan 2010
    Location
    Somewhere
    Posts
    79

    Thumbs up Re: Writing Buffer Overflow Exploits using BackTrack

    Great organization keep up the great work!http://www.backtrack-linux.org/forum...ons/icon14.gif
    Thumbs uphttp://www.backtrack-linux.org/forums/images/icons/icon10.gif
    Talking

  7. #7
    Super Moderator lupin's Avatar
    Join Date
    Jan 2010
    Posts
    2,943

    Default Re: Writing Buffer Overflow Exploits using BackTrack

    Update: Added link to Part Four, A Windows Heap Corruption Exploit.

    This reproduces the Internet Explorer Aurora '0 day' exploit, used (allegedly) by the Chinese to hack Google.

    It can be viewed here.
    Capitalisation is important. It's the difference between "Helping your brother Jack off a horse" and "Helping your brother jack off a horse".

    The Forum Rules, Forum FAQ and the BackTrack Wiki... learn them, love them, live them.

  8. #8
    Member ColForbin's Avatar
    Join Date
    Jan 2010
    Posts
    93

    Default Re: Writing Buffer Overflow Exploits using BackTrack

    First, @lupin: I thank you again for these awesome materials!

    Second, to anyone considering taking PWB and/or CTP, I find lupin's tutorials an Excellent supplementary source of info.
    "Whatever happened to playing a hunch, Scully? The element of surprise, random acts of unpredictability? If we fail to anticipate the unforeseen or expect the unexpected in a universe of infinite possibilities, we may find ourselves at the mercy of anyone or anything that cannot be programmed, categorized or easily referenced."

  9. #9
    Member inf_437's Avatar
    Join Date
    Feb 2010
    Posts
    57

    Default Re: Writing Buffer Overflow Exploits using BackTrack

    @lupin
    These Tutorials are great. Read the first two and just now finished the first one. Thank you for posting them!

  10. #10
    Super Moderator lupin's Avatar
    Join Date
    Jan 2010
    Posts
    2,943

    Default Re: Writing Buffer Overflow Exploits using BackTrack

    Update: Added link to Part Five, Uses an Egghunter, and a conditional jump to get around bad character limitations.

    It can be viewed here.
    Capitalisation is important. It's the difference between "Helping your brother Jack off a horse" and "Helping your brother jack off a horse".

    The Forum Rules, Forum FAQ and the BackTrack Wiki... learn them, love them, live them.

Page 1 of 5 123 ... LastLast

Tags for this Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •