Home note | Binary Exploitation
Post
Cancel

note | Binary Exploitation

Some techniques for Binary Exploitation

Buffer Overflow

BOF with Shellcode

Return Oriented Programming (ROP)

Return to libc

Return to syscall

SigReturn Oriented Programming (SROP)

https://lamecarrot.wordpress.com/2021/06/07/return-oriented-programming-rop-gnu-linux-version/

Format String Vuln

Use after free and double free

Bypass basic protection methods

Bypass

Resources

For Modern Binary Exploitation https://github.com/nnamon/linux-exploitation-course https://exploit.education/fusion/

For Kernel Exploitation https://github.com/xairy/linux-kernel-exploitation https://github.com/s0wr0b1ndef/linux-kernel-exploitation

This post is licensed under CC BY 4.0 by the author.