ROP Challenge – Exploiting write4 Binary

Return Oriented Programming - Write4 Challenge Writeup and Taking advantage of ROP Gadgets that chain together to trigger and exploit the buffer overflow vulnerability in the write4 binary. The challenge focus on reverse engineering the binary and deep diving into chaining the ROP gadgets. Read more
Read More
ROP Challenge – Exploiting Callme Binary

This blog covers the basics of Linkers, Procedure Linkage table and walkthrough on how to capture the flag for callme challenge on ROP Emporium. Read more
Read More
ROP Challenge – Exploiting Split Binary

This blog covers the write up for x86 and x64 architecture for the split binary of ROP Emporium Buffer Overflow Read more
Read More
ROP Challenge – Exploiting ret2win Binary

A detail guide on how to capture the flag using return oriented programming buffer overflow challenge on ROP Emporium. Read more
Read More
Return Oriented Programming – Buffer Overflow Part 1

Return Oriented Programming Buffer Overflow Attack Demonstration Read more
Read More
Buffer Overflow : Exploiting Easy RM to MP3 Converter

Buffer Overflow Demonstration on Exploiting Easy RM to MP3 Converter Read more
Read More
Buffer Overflow Exploits Demystified: From Theory to Practice Part 2

Buffer Overflow Part 2 - Inhouse Lab Exercise to catch the reverse shell and perform RCE Read more
Read More
Buffer Overflow Exploits Demystified: From Theory to Practice Part 1

Buffer Overflow Part 1 - Inhouse Lab Exercise to catch the reverse shell and perform RCE Read more
Read More