1. Introduction to x86-64 Assembly
x86-64, specifically, is the architecture that powers most desktop, laptop, and server processors today (from Intel and AMD). Learning it means you’re learning the language of the dominant computin...
x86-64, specifically, is the architecture that powers most desktop, laptop, and server processors today (from Intel and AMD). Learning it means you’re learning the language of the dominant computin...
Welcome to new series on The Art of the Shellcode: A Practical Journey into x86-64 Assembly. Have you ever wondered what happens beneath the high-level languages like Python, Java, or C++? Beneath...
Introduction Welcome to the fifth heap exploitation technique we’re going to cover: the House Of Spirit. Safe Unlink refers to exploitation techniques that bypass the security checks introduced in...
Introduction Welcome to the fourth heap exploitation technique we’re going to cover: the Safe Unlink. Safe Unlink refers to exploitation techniques that bypass the security checks introduced in gl...
Introduction Welcome to the third heap exploitation technique we’re going to cover: the Unsafe Unlink, a classic heap exploitation method that targets the chunk consolidation process in glibc’s me...
Introduction Welcome to the second heap exploitation technique we’re going to cover: the The Fastbin Dup. The Fastbin Dup attack exploits the fastbin mechanism in ptmalloc, the heap allocator use...
Introduction Welcome to the first heap exploitation technique we’re going to cover: the House of Force. The House of Force technique exploits the top chunk in the heap. The top chunk is a special...
Introduction I finished the Linux Heap Exploitation course on Udemy and it was excellent. I highly recommend you try the course if you want hands-on, practical experience in allocator internals an...
Introduction Havoc is a modern command-and-control (C2) framework with a modular architecture. In the last post, we explored how to install and run Havoc C2. One of its most powerful features is ...
I’ve been diving deeper into Windows internals and red teaming over the past few days. While I already hold penetration testing certifications, I wanted to push beyond surface-level knowledge. That...