Exploitation

Tue
14
Jul

Hacking Team Project X

HackingTeam

Contributed by the anonymous group who hacked the hackingteam

I came across this presentation created by the HackingTeam that was publically released on July 6, 2015. It contains the documented thought process of how they were going to attempt to break in to TOR. Experts place the date of this attempt around the beginning of 2015. Enjoy and learn!

This document is in PDF format. To view it click here.

Wed
01
Jul

Netcat for the Masses

Contributed by Dean De Beer and extracted from the old Infosecwriters archives, but still relevant today.

Having had numerous people recently ask me about the various uses for Netcat I decided to put together a document showing a few handy uses for good ol' Netcat. Netcat has been described as telnet on steroids or a Swiss army knife, both excellent descriptions for this versatile little tool.

Originally written by Hobbit for Linux, Weld Pond later ported it to Windows. In essence it is a tool that reads and writes data across a network connection, using the TCP or UDP Protocol. For the orginal, detailed technical description of Netcat visit: http://www.vulnwatch.org/netcat/

This document is in PDF format. To view it click here.

Wed
01
Jul

The Basics of Shellcoding

Contributed by Angelo Rosiello many years ago (2004) from the old Infosecwriters archives.

A shellcode is a group of instructions which can be executed while another program is running. Nowadays lots of examples show how a shellcode can be uxecuted while an application is running and its followings is proposed us by vulnerabilities' exploits. In order to get advantage from a vulnerability it is indispensable to inject a shellcode because we have to get the control of a running application.

The goal of this article is not to explain all the possibilities of injecting a shellcode developed during last years, but to analyze and understand its essence.

This document is in PDF format. To view it click here.

Wed
24
Jun

HTTP RESPONSE SPLITTING

Contributed by Diabolic Crab from many years ago from the old Infosecwriters archives

This is a fairly new web application vulnerability. It can be used for the following purposes.

Cross site scripting (XSS): This is a very common and old form of vulnerability where it allows the user execution of html or java script code which can then lead to the hijacking of the user's cookie or session. They even allow _javascript code execution and maybe used to exploit other vulnerabilities in browsers with more anonymity.

Wed
24
Jun

Bypassing non-executable-stack during exploitation using return-to-libc

Contributed by C0ntex back in 2004 from the old Infosecwriters archives

Returning to libc is a method of exploiting a buffer overflow on a system that has a non-executable stack, it is very similar to a standard buffer overflow, in that the return address is changed to point at a new location that we can control. However since no executable code is allowed on the stack we can't just tag in shellcode.

This is the reason we use the return into libc trick and utilize a function provided by the library. We still overwrite the return address with one of a function in libc, pass it the correct arguments and have that execute for us. Since these functions do not reside on the stack, we can bypass the stack protection and execute code.

Pages

Subscribe to RSS - Exploitation