Posts Tagged ‘Exploit Tutorial’

How to write buffer Overflow Exploit?

Buffer Overflow

Today, I will show you how to develop your own exploit from scratch or modify exploit to run on different OS. For this purpose,  I have found a Destiny Media Player 1.61 (.rdl) Local Buffer Overflow Exploit from Exploit-db which works fine on Windows XP Pro SP2(Language pack: English) but it didn’t work on Windows […]

Generating Shellcode using Metasploit


What is Shellcode?? Shellcode is a small piece of code used as the payload in the exploitation of a software vulnerability.  It is called “shellcode” because it typically starts a  shell/command prompt  from which the attacker can control the compromised machine.

How to find addresses to overwrite EIP??


While developing exploit, we need to overwrite EIP( Extended Instruction pointer) to change the flow of execution of program. Note: EIP contains the address of the memory which the processor is going to execute. Generally EIP is overwritten with the address of instructions like jmp esp, call , push ret etc. which point to our […]