Lo! I still live! I apologize for the very very long delay that I’ve been putting everyone through lately, I’m sure I was terribly missed *Ahem*, anyway, on with the post: Introduction Firstly, malware analysis and reverse engineering has always been incredibly interesting to me and I noticed that ever since my OEP finding tutorial […]
I’ve been digging into the world of exploit writing lately, working on Defcon‘s previous year’s CTF qualification programs, I ran into Atlas’ presentation on “Kiddie to Hacker in 5 sleepless nights”, which talks about some of his mindset when he first got into binary exploitation. Atlas has written a tool call disass to aid in […]
…because all the other tutorials I’ve been able to find on this subject are not so easy to read. This is going to be a long post, but hey, at least it’ll have lots of pictures! Alright, in this tutorial I’m going to attempt to explain how to find the OEP (Original Entry Point) of […]