|
You are here |
blog.pi3.com.pl | ||
| | | | |
www.basicinputoutput.com
|
|
| | | | | A blog about UEFI BIOS C programming software development engineering computer science history | |
| | | | |
blog.infosectcbr.com.au
|
|
| | | | | Summary This is the 3rd part of the C++ memory corruption series*. In this post, we'll look at corrupting the std::list class in Linux and see what exploitation primitives we can gain. We'll see that we can build arbitrary read/write primitives. * https://blog.infosectcbr.com.au/2020/08/c-memory-corruption-part-1.html* https://blog.infosectcbr.com.au/2022/01/c-memory-corruption-stdvector-part-2.html Author: Dr Silvio Cesare IntroductionC++ is a common language for memory... | |
| | | | |
siunam321.github.io
|
|
| | | | | My personal website | |
| | | | |
www.timdbg.com
|
|
| | | [AI summary] This article provides an introduction to reading x86 assembly language, emphasizing its importance for understanding how programs operate at a fundamental level. It covers the basics of assembly syntax, common instructions, and practical tools for reading and analyzing assembly code. The author explains that while assembly is often viewed as complex, it's actually more approachable than many believe, especially for debugging and reverse engineering tasks. The article also highlights the differences between Intel and AT&T syntax, the structure of assembly instructions, and the role of registers and memory addressing in x86 architecture. | ||