I’ve been digging into the world of exploit writing lately, working on Defcon‘s previous year’s CTF qualification programs, I ran into Atlas’ presentation on “Kiddie to Hacker in 5 sleepless nights”, which talks about some of his mindset when he first got into binary exploitation. Atlas has written a tool call disass to aid in […]
…because all the other tutorials I’ve been able to find on this subject are not so easy to read. This is going to be a long post, but hey, at least it’ll have lots of pictures! Alright, in this tutorial I’m going to attempt to explain how to find the OEP (Original Entry Point) of […]
You know what would be really helpful? I mean, actually helpful to people in the security industry as a whole? We need some kind of collaboration tool that allows many different users to view, download, analyze, tag, describe and ask questions about any and all kinds of malware, network captures and security logs. I’ve been […]