Part 1 | Stack-based Buffer Overflow exploitation to shell by example
Tags
attack-pattern: | Exploits - T1587.004 Exploits - T1588.005 Python - T1059.006 Tool - T1588.002 |
Common Information
Type | Value |
---|---|
UUID | df991bbf-1ff7-401b-b036-780d9fc30321 |
Fingerprint | 2f5208537f211318 |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | Sept. 27, 2016, midnight |
Added to db | Jan. 18, 2023, 9:31 p.m. |
Last updated | Nov. 18, 2024, 11:24 a.m. |
Headline | desc0n0cid0 |
Title | Part 1 | Stack-based Buffer Overflow exploitation to shell by example |
Detected Hints/Tags/Attributes | 27/1/9 |
Source URLs
Redirection | Url | |
---|---|---|
Details | Source | https://desc0n0cid0.blogspot.com/2016/09/stack-based-buffer-overflow.html |
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 4131 | github.com |
|
Details | Domain | 4 | www.agner.org |
|
Details | Domain | 1 | payloadmaker100.py |
|
Details | File | 1 | calling_conventions.pdf |
|
Details | File | 18 | pattern_create.rb |
|
Details | File | 1 | payloadmaker100.py |
|
Details | Github username | 3 | pwndbg |
|
Details | Url | 3 | https://github.com/pwndbg/pwndbg |
|
Details | Url | 1 | http://www.agner.org/optimize/calling_conventions.pdf |