|
You are here |
blog.inhq.net | ||
| | | | |
blog.nuculabs.dev
|
|
| | | | | Hello, In this article I present you the solution to nice and short cracking challenge from Root-Me. After opening it up in Ghidra, I saw that the challenge is easy to solve, all you need is to find the password, which is in plain text. Basically just copy paste and you get the flag, but wait, there's a twist! I should have learned my lesson from the other challenge from Root-Me, which also had a twist. | |
| | | | |
scriptjunkie.us
|
|
| | | | | [AI summary] The content discusses an analysis of a Firefox exploit, focusing on its technical details, including heap buffer overflow vulnerabilities, heap sprays, ROP chains, and the challenges in making it functional across different Windows versions. It also touches on the author's attempt to improve the exploit by removing hard-coded addresses and system call numbers, and the limitations imposed by ASLR and DEP. | |
| | | | |
manybutfinite.com
|
|
| | | | | Last week we looked at how the stack works and how stack frames are built during function prologues. Now it's time to look at the inverse process as stack frames are destroyed in function epilogues. | |
| | | | |
denniskubes.com
|
|
| | | |||