Learn Ethical Hacking
Egg hunting in 32-bit Windows binary exploitation is a technique used to locate and exploit vulnerabilities in software running on 32-bit ve...
Get shellcode of the binary using objdump objdump -d ./Exit.o|grep '[0-9a-f]:'|grep -v 'file'|cut -f2 -d:|cut -f1-6 -d...
RAX - System Call number RDI - 1st Argument RSI - 2nd RDX - 3rd R10 - 4th R8 - 5th R9 - 6th 64-bit Registers Basic info Accumulator ...
# Simple BOF # jmp_address - somewhere at the start of NOPS NOPS + shellcode + A*(EBP_offset-len(shellcode)) + jmp_address #When you hav...
ELF INFO #Hex to Decimal printf "%d\n" 0x18 #Get ELF headers readelf -h hello_world #Get Program Headers - 9 Headers readelf...
Intelligent Platform Management Interface ( IPMI) is a hardware-based system management and monitoring tool that is widely used by sysadmins...
# Open a file with GDB gdb ./file #quite gdb -q .file #run the process r run #run a process r 127.0.0.1 -c 1 #run PID; -q is for quiet...
Hello all, This is a simple cheat sheet for Hacking/Pentesting Captive Portals Enabled Wireless/Wifi networks Before Starting the attack, i...