content top

Heap Spraying – Active X Controls Under Attack

Heap Spraying – Active X Controls Under Attack

4Introduction   An ActiveX control is essentially a simple OLE object that supports the IUnknown interface. It was introduced in 1996 by Microsoft as a development of its Component Object Model (COM) and Object Linking and Embedding (OLE) technologies and is commonly used in its Windows Operating System.   ActiveX controls are highly portable COM objects, used extensively throughout Microsoft Windows platforms and, especially, in...

Read More

Shellcode Of Death – null Security Meet

Shellcode Of Death – null Security Meet

0Introduction   It’s was my pleasure to talk about “Shellcode Of Death” a.k.a “Wicked Sunny“. The event was null Pune which held @SICSR.   Topics and Schedules   04:00 PM – 04:10 PM: Introduction by Null + G4H team 04:10 PM – 05:15 PM : Shell Code of Death by Ashfaq Ansari.   I was giving the talk on “Shellcode Of Death” a.k.a “Wicked...

Read More

Shellcode Of Death

Shellcode Of Death

17Introduction   Recently, I had been working on a shellcode project that we named as “Shellcode Of Death“. “Shellcode of Death” is designed to run on Windows x86 platforms like Windows XP/Vista/7/8/Server 2003/2008.   What this shellcode does?     Well, this shellcode has been designed to format all the available drive on Windows. Weird? Huh!!! Yes, I know you may be thinking this is weird and...

Read More

Art Of Exploit Writing – null Security Meet

Art Of Exploit Writing – null Security Meet

2Introduction   It’s was my pleasure to be with fantastic security minds of Bangalore. The event was null Bangalore which held @ThoughtWorks.   Topics and Schedules   09:30 – 10:00: Web App Basics – Insecure Direct Object Reference – Himanshu Das 10:00 – 10:15: Introductions 10:15 – 10:35: Newsbytes – Apurva 10:35 – 11:05: Vulnerability Disclosure – Nikhil Kulkarni 11:05...

Read More

Egg Hunter – Twist in Buffer Overflow – BisonWare FTP Server v3.5

Egg Hunter – Twist in Buffer Overflow – BisonWare FTP Server v3.5

4INTRODUCTION It’s time for breakfast and I prefer bread with omelet. Eggs are a fantastic source of energy for humans.:-) “Eggs” also plays an important role when it comes to complex exploit development. As we know, in stack-based buffer overflow, the memory is more or less static. That is, we have enough memory to insert our shellcode. When the “Egg hunter” shellcode is executed, it searches for the unique “tag” that was...

Read More
content top