diff --git a/README.md b/README.md index 4aa08c7..751c59b 100644 --- a/README.md +++ b/README.md @@ -14,6 +14,13 @@ corelan.be Exploitation Tutorials strongly rely on this application in a vulnera # Anti-Exploitation +## ASLR + +### Disable +* Add key to regedit + * regedit [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management] + * MoveImages=dword:00000000 + ## DEP / ROP ### OS Specifics @@ -67,5 +74,17 @@ corelan.be Exploitation Tutorials strongly rely on this application in a vulnera * WriteProcessMemory(). This will allow you to copy your shellcode to another (executable) location, so you can jump to it and execute the shellcode. The target location must be writable and executable. # References +## Exploitation * https://www.corelan.be/index.php/2010/06/16/exploit-writing-tutorial-part-10-chaining-dep-with-rop-the-rubikstm-cube/ * https://www.corelan.be/index.php/2009/09/21/exploit-writing-tutorial-part-6-bypassing-stack-cookies-safeseh-hw-dep-and-aslr/ + +## Assembly + +* https://www.felixcloutier.com/x86/pusha:pushad + +## Tools + +* https://hex-rays.com/ida-free/#download +* https://x64dbg.com/#start +* https://www.immunityinc.com/products/debugger/ +* http://www.ollydbg.de/