Basic Buffer Overflows Explained: OSCP, eCPPT, and TryHackMe Prep
Tags
attack-pattern: | Data Exploits - T1587.004 Exploits - T1588.005 Malware - T1587.001 Malware - T1588.001 Python - T1059.006 Server - T1583.004 Server - T1584.004 Tool - T1588.002 Hypervisor - T1062 |
Common Information
Type | Value |
---|---|
UUID | a52b6fa9-5cfc-4093-905f-5eba10e3cbe6 |
Fingerprint | c0d3c851ec263bf8 |
Analysis status | DONE |
Considered CTI value | -2 |
Text language | |
Published | May 16, 2023, 9:46 p.m. |
Added to db | May 16, 2023, 11:51 p.m. |
Last updated | Nov. 13, 2024, 9:27 a.m. |
Headline | Basic Buffer Overflows Explained: OSCP, eCPPT, or TryHackMe Prep |
Title | Basic Buffer Overflows Explained: OSCP, eCPPT, and TryHackMe Prep |
Detected Hints/Tags/Attributes | 51/1/11 |
Source URLs
URL Provider
RSS Feed
Details | Id | Enabled | Feed title | Url | Added to db |
---|---|---|---|---|---|
Details | 167 | ✔ | Cybersecurity on Medium | https://medium.com/feed/tag/cybersecurity | 2024-08-30 22:08 |
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 43 | www.kali.org |
|
Details | Domain | 21 | mona.py |
|
Details | File | 3 | vulnserver.exe |
|
Details | File | 4 | essfunc.dll |
|
Details | File | 18 | pattern_create.rb |
|
Details | File | 20 | mona.py |
|
Details | File | 3 | bytearray.bin |
|
Details | File | 3 | nasm_shell.rb |
|
Details | IPv4 | 4 | 192.168.1.25 |
|
Details | IPv4 | 16 | 192.168.1.11 |
|
Details | Url | 1 | https://www.kali.org/tools/spike |