Husky vs. PTXv2 Part 1: Macro Mayhem, Advanced Social Engineering, and a Free Upgrade #sponsored

<disclaimer> This post series is still sponsored by eLearnSecurity and VetSec! As always, a huge thank you goes to both of them and please consider this while enjoying the content. Check out my first post to see the details. Additional disclaimer: This is where I begin to talk about the tradecraft and the specific, technical…

x86 Exploit Development Pt 1 – Intro to Computer Organization and x86 Instruction Set Architecture Fundamentals

Hey guys! I figured that it would be beneficial to have an entire post dedicated to teaching some fundamentals about Computer Organization and the x86 Instruction Set Architecture, since I will be referencing this particular ISA (instruction set architecture) throughout most of my tutorials on Exploit Development and Reverse Engineering. This will be updated over…

32-Bit Windows Buffer Overflows Made Easy

Video tutorials: https://www.youtube.com/playlist?list=PLLKT__MCUeix3O0DPbmuaRuR_4Hxo4m3G Written tutorial:   Hello everyone! Welcome to my first post here at VetSec. For my first blog, I thought it would be helpful to provide a walkthrough of a 32-bit Windows buffer overflow. For most people breaking into cyber security, buffer overflows can be hard for someone to wrap their mind around.…