Hey guys! I figured that it would be beneficial to have an entire post dedicated to teaching some fundamentals about Computer Organization and the x86 Instruction Set Architecture, since I will be referencing this particular ISA (instruction set architecture) throughout most of my tutorials on Exploit Development and Reverse Engineering. This will be updated over
Category: Exploit Development
Part 3 of creating my Wargame to teach people exploit development and reverse engineering.
A basic reverse engineering challenge for a CTF and a mini intro to RE.
Intro to makefiles, BASH scripts, and making a simple buffer overflow program.
An introduction and learning experience with Vagrant and creating a wargame.
Video tutorial: Written tutorial: Hello everyone! Welcome to my first post here at VetSec. For my first blog, I thought it would be helpful to provide a walkthrough of a 32-bit Windows buffer overflow. For most people breaking into cyber security, buffer overflows can be hard for someone to wrap their mind around. My goal