Vetsec Becoming a Non-Profit!

Hello everyone! This announcement is long overdue. VetSec is moving forward with our non-profit initiative. Today, we registered for non-profit in hopes of gaining a more traction and helping us solidify a more official purpose.With that being said, we've set up a Patreon page to help cover costs for future endeavors. If you can spare…

x86 Exploit Development Pt 2 – ELF Files and Memory Segmentation

Hey again! This is part 2 of my Introduction to x86 Exploit Development. If you didn't check out my first part of this series, I highly recommend it before reading this. In this post, we go a little more in depth as to how things get laid out in memory from a program standpoint, now…

Getting Started Guide for VetSec Wargame Exploit Development Tutorials

Hey everyone! This post will serve as a supplement to my first of many tutorials on Buffer Overflows for Linux which will tie into my Exploit Development tutorials. I will try to keep this post focused on the minimum amount of knowledge needed to understand what a buffer overflow is, how it works, and how to…

x86 Exploit Development Pt 1 – Intro to Computer Organization and x86 Instruction Set Architecture Fundamentals

Hey guys! I figured that it would be beneficial to have an entire post dedicated to teaching some fundamentals about Computer Organization and the x86 Instruction Set Architecture, since I will be referencing this particular ISA (instruction set architecture) throughout most of my tutorials on Exploit Development and Reverse Engineering. This will be updated over…