thegreycorner.com
The Grey Corner: June 2011
http://www.thegreycorner.com/2011_06_01_archive.html
A blog focused on the related subjects of software exploitation, penetration testing and computer incident detection and response. Saturday, June 25, 2011. SEH Based Buffer Overflow Tutorial for Vulnserver. I wrote this tutorial on exploiting an SEH based vulnerability in Vulnserver a while back and am just getting around to posting a link for it here now that some formatting issues have been sorted. Its at the InfoSec Institute site once more. Posted by Stephen Bradshaw. Links to this post. SpiderLabs B...
thegreycorner.com
The Grey Corner: February 2013
http://www.thegreycorner.com/2013_02_01_archive.html
A blog focused on the related subjects of software exploitation, penetration testing and computer incident detection and response. Saturday, February 16, 2013. It's official. My own entry. In the Hackers Database. What is the Hackers Database? What is the main goal of the Hacker Database? Known as the HDB). Posted by Stephen Bradshaw. Links to this post. Subscribe to: Posts (Atom). View my complete profile. Five Attributes of an Effective Corporate Red Team. A Shadow of our Former Self. Industry Report: ...
thegreycorner.com
The Grey Corner: Version 0.5 of SSL Testing Tool ssltest.pl
http://www.thegreycorner.com/2015/03/version-05-of-ssl-testing-tool-ssltestpl.html
A blog focused on the related subjects of software exploitation, penetration testing and computer incident detection and response. Monday, March 16, 2015. Version 0.5 of SSL Testing Tool ssltest.pl. Added support for scanning versions 1.1. and 1.2 of TLS. Updated cipher list for the newer versions of OpenSSL. The new list is quite a bit bigger than that of the previous version, but specific support depends on your underlying OpenSSL library. Chris Mahns, from whom I. Borrowed the initial codebase and ide...
pwningmad.wordpress.com
About | Pwning Mad
https://pwningmad.wordpress.com/about
Leave a Reply Cancel reply. Enter your comment here. Fill in your details below or click an icon to log in:. Address never made public). You are commenting using your WordPress.com account. ( Log Out. You are commenting using your Twitter account. ( Log Out. You are commenting using your Facebook account. ( Log Out. You are commenting using your Google account. ( Log Out. Notify me of new comments via email. TU CTF 2016 – WhereHereticsSuffer Stage2 (150). SharifCTF Network Forensics task writeup.
thegreycorner.com
The Grey Corner: December 2011
http://www.thegreycorner.com/2011_12_01_archive.html
A blog focused on the related subjects of software exploitation, penetration testing and computer incident detection and response. Saturday, December 3, 2011. Restricted Character Set Buffer Overflow Tutorial for Vulnserver. The title says it all. You can find the tutorial here. Posted by Stephen Bradshaw. Links to this post. Stack based buffer overflow. Windows stack based buffer overflow. Subscribe to: Posts (Atom). View my complete profile. Restricted Character Set Buffer Overflow Tutorial . Hendy Chu...
thegreycorner.com
The Grey Corner: My Python gdb Extensions
http://www.thegreycorner.com/2013/10/my-python-gdb-extensions.html
A blog focused on the related subjects of software exploitation, penetration testing and computer incident detection and response. Sunday, October 20, 2013. My Python gdb Extensions. If you started to learn reverse engineering and exploit development on 32 bit Windows systems as I did, you were probably very unimpressed when you first attempted to try out your skills on *nix machines and started (trying to) use gdb. I know I was. Gdb lookin like Olly! If you're running this on OSX, please note that the X...
pwningmad.wordpress.com
July | 2015 | Pwning Mad
https://pwningmad.wordpress.com/2015/07
Monthly Archives: July 2015. Vancouver BSides CTF 2015 re250 writeup. On July 14, 2015. When I play CTFs I tend to pick tasks that cover topics that I have no idea about. This makes an opportunity to learn something new. Those usually are web, pwn and forensics tasks. However, sometimes I just pick RE task to check if my skills haven’t rusted too much. Also reversing tasks are often well rewarded in ctf points. Vancouver BSides CTF 2015. Reversing task was called “ detent. File size: 26296 bytes. Almost ...
thegreycorner.com
The Grey Corner: Vulnserver
http://www.thegreycorner.com/p/vulnserver.html
A blog focused on the related subjects of software exploitation, penetration testing and computer incident detection and response. Vulnserver is a Windows based threaded TCP server application that is designed to be exploited. The program is intended to be used as a learning tool to teach about the process of software exploitation, as well as a good victim program for testing new exploitation techniques and shellcode. The program supports no other command line options. Links to this post. CommonCollectio...
thegreycorner.com
The Grey Corner: August 2014
http://www.thegreycorner.com/2014_08_01_archive.html
A blog focused on the related subjects of software exploitation, penetration testing and computer incident detection and response. Saturday, August 23, 2014. Hlextend Pure Python hash length extension module. Ive been spending some time recently looking at various types of cryptographic vulnerabilities, trying to work out more efficient ways of identifying and exploiting them during penetration tests. Hash length extension attacks. The module is available on GitHub. Basic usage involves copying the modul...
SOCIAL ENGAGEMENT