Hey again! This is part 2 of my Introduction to x86 Exploit Development. If you didn’t check out my first part of this series, I highly recommend it before reading this. In this post, we go a little more in depth as to how things get laid out in memory from a program standpoint, now
Hey everyone! This post will serve as a supplement to my first of many tutorials on Buffer Overflows for Linux which will tie into my Exploit Development tutorials. I will try to keep this post focused on the minimum amount of knowledge needed to understand what a buffer overflow is, how it works, and how to
Hey guys! I figured that it would be beneficial to have an entire post dedicated to teaching some fundamentals about Computer Organization and the x86 Instruction Set Architecture, since I will be referencing this particular ISA (instruction set architecture) throughout most of my tutorials on Exploit Development and Reverse Engineering. This will be updated over
Part 3 of creating my Wargame to teach people exploit development and reverse engineering.
A basic reverse engineering challenge for a CTF and a mini intro to RE.
Intro to makefiles, BASH scripts, and making a simple buffer overflow program.
An introduction and learning experience with Vagrant and creating a wargame.