That’s the goal. The real goal is much more than that but it seemed a little outlandish to start out with 10,000 hours of hacking. Why 10,000 hours? That’s the amount of time I have read it takes to become proficient at whatever you are trying to do. 10,000 hours seems rather arbitrary, but […]
I have seen the debate over the value of college in the cyber security world play out in several arenas. There are people who feel college is valuable and people who feel that college is a complete waste of time. I’m not going to jump on either side of the argument because I feel it […]
I started this blog several months ago with one thing in mind. I wanted to write down what I learned about exploits. I wanted to present things in a way that someone may find helpful. I haven’t written anything for a few months for various reasons but it’s certainly on my to do list this […]
Last time we looked at how the stacks (32-bit and 64-bit) filled up with our command line arguments in an overflow example from Hacking The Art of Exploitation. We found out that there were 8 bytes between buffer_two and buffer_one along with four bytes between buffer_one and variable on the 64-bit stack. Those numbers are […]
It’s time to continue exploring the differences in 64-bit and 32-bit architecture (at least from a buffer overflow standpoint) by taking a look at their respective stacks in memory. We are going to use the same program we used last time and see what we figure out by using gdb. I’m going to walk through […]
Today we are going to do a little discussion about the differences between a 32-bit machine and a 64-bit machine with x86 architecture. The differences in the architectures have implications for how we go about exploiting programs. I am going to be doing some comparisons between the 32-bit Debian I have been using and 64-Bit […]
The road to modern memory exploits.
We have hit an interesting point in HTAE. We can continue on as we have been going through the book or we can do something a little different. I’m electing to do something a little different. The reasoning behind this is as follows. To continue with Hacking the Art of Exploitation under the assumption that […]