eXploiting Local Stack on Windows
By: Nish Bhalla
In this article we will discuss what a stack overflow is provide a little background on stack overflows and attempt to write a local overflow exploit.
By: Nish Bhalla
In this article we will discuss what a stack overflow is provide a little background on stack overflows and attempt to write a local overflow exploit.
By: L33tdawg
Disclaimer: This article is for INFORMATIONAL / EDUCATIONAL purposes only. HITB does not condone software piracy.
Introduction
Back in June 2005 when Apple first announced its plans to scrap its partnership with IBM and switch its computers to Intel's microprocessors, I think everyone was a little too shocked for words. There was once a time when Apple had sworn that PowerPC was a more superior platform and that Intel basically sucked.
By: Don Parker
By: Shreeraj Shah
Introduction
By: Derek Melber
Note: This article has previously appeared over at our affiliates site Windows Security. The original article can be found here.
By: Rosli Sukri
Now, without spending a lot of money you to can build an authenticated gateway solution to verify your WIFI users. First and foremost you need to get your hands on the coolest free BSD system for firewalls and security devices. In this example I will be using OpenBSD3.6 stock standard as a build and a base system (but I guess you could use FreeBSD5.3 – me thinks the newer FreeBSD are getting a bit bloated but the background fscking, fscking rocks dude!)
By: Deb Shinder
Note: This article has previously appeared over on our affiliates site Windows Security. The original article can be found here.
By: Don Parker
Note: This article first appeared over at our affiliate site Windows Security the original article can be found here.
By: Zarul Shahrin
The paper has been specially re-written for the Hack In The Box E-Zine. The solution part is totally new and not in the original paper posted on Bugtraq. Much thanks to L33tdawg for giving me
the chance to include my paper.
I read a great article written by Vangelis about exploiting local vulnerabilities under
Fedora 2. It was a great article but our Redhat Security Expert, Arjan van de Ven said that the author did not compile the vulnerable program into PIE executable: