A long time ago, during my studies in informatics, I began writing shellcodes and creating binary exploits for various CTFs. I made notes along the way and considered compiling them into cheatsheets. Eventually, I consolidated all these notes into a book. I thought about to publish it on Amazon but, nahhh... I decided to let it on my drive, till now. I think it's time to just load this book on my site an maybe someone reads this book. May it helps someone to understand binary exploitation a bit.
info
This book is only about linux based exploit development
Topics are covered
- Buffer overflow
- Ret2Libc
- ROP-Chain
- Off-by-One
- Shellcode Alchemy
- Format-String
- Integer Overflow/Underflow
- Metasploit-Development