Hi, I haven't done much hacking lately, so I want to show what other interesting ways there are to exploit programs. One possibility is the format string attack.
29 posts tagged with "hacking"
View All TagsVH - Mr Robot
Intro
Who does not know the series, Mr Robot. In the series, when Elliot had played CTF with, I thought to myself, I must do sometime also. A year later, so today, because I had a lot around the ears, I come only now to play times CTF 😄
Cut someone’s network connection with arpspoofing
Hi, I had thought about a little troll for a colleague in front of me. Short story he gambles a lot on Steam, I thought how can I torch him a bit, but so that he does not realize that it is me 😄
What is Rowhammer?
Hi, I'm just reading up on Rowhammer, and I just want to put everything I already know down here.
Init.d root reverse Shell
I took the liberty to play around with Bash a bit. What came out of it, a small reverse TCP shell, which runs as init.d script. The idea was the following: "What if you already have root rights on a system? You don't want to create a new user, which also has root rights, because it might be noticed. So what do you do? Of course you create a backdoor, which runs with root rights. And that's exactly what it is.
Extract EXIF-Data from Images
Pictures and more pictures. We all like photos and pictures, but what if the pictures also contain more than you see at first glance? It should be known to everyone, but I'll just write a post about it anyway.
NetCat - Portscanning TCP/UDP
NetCat as I mentioned in the previous post Post, that it is a Swiss army knife is not yet completely clear. Here I want to show that you can also make portscanns with NetCat no matter if TCP or UDP.
NetCat - Simple Bind-TCP Shell and Reverse-TCP Shell
Hi, I decided to write a bit about NetCat, specifically simple bind/reverse shell.
Netcat or nc is a real swiss army knife among network tools. With Netcat you can connect to many services like Telnet, RSH, HTTP etc... To that NetCat can do TCP/UDP. Netcat is very powerful, it is just because it is so powerful also used by hackers to create a backdoor or for bind and reverse shells.
How to write a simple Bufferoverflow Exploit.
Hi, after the few posts from Exploit-DB I thought why not try to make a HowTo.
How to build a simple bufferoverflow exploit? Is it much effort?