• OSCP - Useful Resources
  • Introduction
  • Information Gathering/Reconnaissance
  • Port Scanning
  • Backdoors/Web Shells
  • Local File Inclusion/Remote File Inclusion
  • Shell Spawning
  • Windows Privilege Escalation
  • Linux Privilege Escalation
  • Fuzzing Payloads
  • Metasploit
  • MSFVenom
  • File Transfer
  • Samba (SMB)
  • Windows Post-Exploitation
  • Linux Post-Exploitation
  • Pivoting
  • Buffer Overflows
  • Remote Desktop Protocol (RDP)
  • SQL Injection
  • Password Cracking
  • Pre-Exam Prep
  • Cross-Compilation
  • Jailed Shell Escape
  • General Notes
Powered by GitBook

Buffer Overflows

Buffer Overflows

  1. http://www.primalsecurity.net/0x0-exploit-tutorial-buffer-overflow-vanilla-eip-overwrite-2/
  2. http://proactivedefender.blogspot.ca/2013/05/understanding-buffer-overflows.html
  3. http://justpentest.blogspot.ca/2015/07/minishare1.4.1-bufferoverflow.html
  4. https://samsclass.info/127/proj/vuln-server.htm
  5. http://www.bulbsecurity.com/finding-bad-characters-with-immunity-debugger-and-mona-py/

results matching ""

    No results matching ""