Buffer Overflow Tutorial

-- Buffer Overflow Tutorial --  Hi we are going to do a basic stack overflow on a vulnerable program to get a reverse shell I apoligise for my english..it's not my native language Our vulnerable program: -- vuln-prog.c #include <stdlib.h> #include <stdio.h> #include <string.h> int bof(char *string) {   char buffer[1024];   strcpy(buffer, string);   return 1; } int main(int argc, char *argv[])...

Analysis of brute force & dictionary attacks

.-::Analysis of brute force & dictionary attacks.::-. [ 0x00 ] Chapters ================================================ [ 0x01 ] Prologue [ 0x02 ] Terms & Conventions [ 0x03 ] Tools, Environment & Prerequisites [ 0x04 ] Basic Theory [ 0x05 ] ASCII Codes [ 0x06 ] Hashes [ 0x07 ] Brute Force Attack [ 0x08 ] Theory [ 0x09 ] Source Code Analysis [ 0x0a ] Dictionary Attack [ 0x08 ] Theory [ 0x09 ] Source Code Analysis [ 0x0d...

Hacking from your Web Browser

Hacking from your Web Browser ************************************************************************ I - Introduction This file will describe several techiniques to aquire a password file just by using an ordinary web browser.  The information provided will be best described for the beginner hacker, but all hackers should benifit from this information.  We will only cov er phf in this file but, feel free to explore...

UNIX hacking

                                                                                                       ..  The Beginner's guide ..             ...