Stack Manipulation Using POP RET

Exploiting is a very interesting topic and there are many ways of manipulating the stack. One of those ways is using the POP, RET functions. Using the “Free MP3 CD Ripper” – Exploit from my first tutorial, I would like to show how a POP RET is...

Buffer Overflow Exploitation: A Real World Example

Hello readers again! Since I am still getting deeper into penetration tests in AppSec, it helps quite a lot to write about things to get new ideas and thoughts – so I decided to write a little tutorial on how a buffer overflow basically works using a real world...
Hello World

Hello World

Welcome to my blog about IT-Security, Vulnerability Researching, Reverse Engineering, Linux, and creativity in general :-). This blog will contain everything the Security-heart loves – enjoy your reading! This site is officially still under construction since I...