Home
Ins1gn1a
Cancel

Identifying Bad Characters Manually

Without using plugin modules like Mona, setting up a PyDBG script, or using other automated tools, this blog post will provide some examples of manually identified bad characters and the process be...

Manually Backdooring PE Files

Tools like msfvenom, Veil-Evasion, Shellter, and so many more allow automatic-patching of malicious code into a Portable Executable (PE) file. This blog post will walk through a manual shellcode im...

Exploitation of SEH

Using the ‘VulnServer’ program we’ll demonstrate a stack overflow that introudces Structured Exception Handling (SEH) event handling to gain a shell on a sample system. In this instance I’ll be ta...

Exploiting Minimal Buffer Overflows with an Egghunter

Using the ‘VulnServer’ program we’ll demonstrate a stack overflow that presents a minimal available buffer size for shellcode and construct a script to perform remote code execution to gain a shell...

An Introduction in Exploiting Basic Vanilla Buffer Overflows

A buffer overflow occurs when input data within a program exceeds the designed memory allocation. The remaining input data can often be written to memory, and as such it is often possible to exploi...