Exploit-tech icon indicating copy to clipboard operation
Exploit-tech copied to clipboard

Example files to experience basic exploit techniques.

Exploit-tech

Hi, I am Lazneca.0x0

These files are the example files used at "https://www.lazenca.net/display/TEC/06.Exploit+tech". I hope that I will be able to use the text that I wrote and these files to help people who are new to Hacking's exploit technology to understand the technology a little easier.

All my writings are written in Korean. If someone can translate the contents on my site in English. Please help me.

Site

  • Web site : https://www.lazenca.net/
  • Facebook: https://www.facebook.com/Lazenca.0x0/

Linux Kernel exploitation Tutorial.

Tutorial list

01.Shellcode

02.Return to Shellcode

03.RTL(Return to libc)

04.Frame faking(Fake ebp)

05.Frame Pointer Overwrite

06.ROP(Return Oriented Programming)

07.SROP(Sigreturn-oriented programming)

08.BROP(Blind Return Oriented Programming)

09.Race condition

10.One-gadgets(feat. PLT/GOT overwrite)

11.Heap Spray

12.Heap Feng Shui

13.JOP(Jump-Oriented Programming)

14.Return-to-csu(__libc_csu_init)

15.Return-to-dl-resolve

16.Stack pivot