.
This commit is contained in:
19
README.md
19
README.md
@@ -14,6 +14,13 @@ corelan.be Exploitation Tutorials strongly rely on this application in a vulnera
|
||||
|
||||
# Anti-Exploitation
|
||||
|
||||
## ASLR
|
||||
|
||||
### Disable
|
||||
* Add key to regedit
|
||||
* regedit [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management]
|
||||
* MoveImages=dword:00000000
|
||||
|
||||
## DEP / ROP
|
||||
|
||||
### OS Specifics
|
||||
@@ -67,5 +74,17 @@ corelan.be Exploitation Tutorials strongly rely on this application in a vulnera
|
||||
* WriteProcessMemory(). This will allow you to copy your shellcode to another (executable) location, so you can jump to it and execute the shellcode. The target location must be writable and executable.
|
||||
|
||||
# References
|
||||
## Exploitation
|
||||
* https://www.corelan.be/index.php/2010/06/16/exploit-writing-tutorial-part-10-chaining-dep-with-rop-the-rubikstm-cube/
|
||||
* https://www.corelan.be/index.php/2009/09/21/exploit-writing-tutorial-part-6-bypassing-stack-cookies-safeseh-hw-dep-and-aslr/
|
||||
|
||||
## Assembly
|
||||
|
||||
* https://www.felixcloutier.com/x86/pusha:pushad
|
||||
|
||||
## Tools
|
||||
|
||||
* https://hex-rays.com/ida-free/#download
|
||||
* https://x64dbg.com/#start
|
||||
* https://www.immunityinc.com/products/debugger/
|
||||
* http://www.ollydbg.de/
|
||||
|
||||
Reference in New Issue
Block a user