|
You are here |
nullset.xyz | ||
| | | | |
unorde.red
|
|
| | | | | [AI summary] A detailed writeup of solving the 'Bangalore' level in the Microcorruption CTF, focusing on bypassing Data Execution Prevention (DEP) through interrupt manipulation and shellcode execution. | |
| | | | |
michaelneuper.com
|
|
| | | | | A buffer overflow attack is a type of cyber attack in which an attacker attempts to write more data to a buffer (a temporary data storage area) in a computer's memory than the buffer is designed to hold. This can cause the buffer to overflow, or exceed its maximum capacity, which can corrupt other parts of the computer's memory and allow the attacker to gain unauthorized access to the system. | |
| | | | |
tcode2k16.github.io
|
|
| | | | | a random blog about cybersecurity and programming | |
| | | | |
blog.martinig.ch
|
|
| | | Architecture is an important asset for good programming and the notion of "pattern" is here to help us apply already trusted code architecture solutions to common problems. Jason McDonald has done a wonderful job to group some of them in a document that should be useful to most software developers. Go to his blog to | ||