content top

Art Of Exploit Writing – null Security Meet

Art Of Exploit Writing – null Security Meet

2Introduction   It’s was my pleasure to be with fantastic security minds of Bangalore. The event was null Bangalore which held @ThoughtWorks.   Topics and Schedules   09:30 – 10:00: Web App Basics – Insecure Direct Object Reference – Himanshu Das 10:00 – 10:15: Introductions 10:15 – 10:35: Newsbytes – Apurva 10:35 – 11:05: Vulnerability Disclosure – Nikhil Kulkarni 11:05...

Read More

Egg Hunter – Twist in Buffer Overflow – BisonWare FTP Server v3.5

Egg Hunter – Twist in Buffer Overflow – BisonWare FTP Server v3.5

4INTRODUCTION It’s time for breakfast and I prefer bread with omelet. Eggs are a fantastic source of energy for humans.:-) “Eggs” also plays an important role when it comes to complex exploit development. As we know, in stack-based buffer overflow, the memory is more or less static. That is, we have enough memory to insert our shellcode. When the “Egg hunter” shellcode is executed, it searches for the unique “tag” that was...

Read More

FreeFloat FTP Server – Buffer Overflow

FreeFloat FTP Server – Buffer Overflow

9INTRODUCTION In computer security and programming, a buffer overflow, or buffer overrun, is an anomaly where a program, while writing data to a buffer, overruns the buffer’s boundary and overwrites adjacent memory. This is a special case of violation of memory safety. Buffer overflows can be triggered by inputs that are designed to execute code, or alter the way the program operates. This may result in erratic program behavior,...

Read More
content top