목록전체 글 (110)
strangerRidingCaml
Frame Faking and Fake EBP Lab In this lab, we will learn how to manipulate stack frames and EBP for privilege escalation. Lab Activities: 1. Creating Vulnerable C Program: First, let's create a vulnerable C program with a buffer overflow vulnerability. #include #include void vulnerable_function(char *input) { char buffer[64]; strcpy(buffer, input); } int main(int argc, cha..
Return-to-Libc (RTL) Exploits Lab In this lab, we will learn how to craft RTL exploits to bypass ASLR and DEP protections. Lab Activities: 1. Creating Vulnerable C Program: First, let's create a vulnerable C program with a buffer overflow vulnerability. #include #include void vulnerable_function(char *input) { char buffer[64]; strcpy(buffer, input); } int main(int argc, ch..
Return-to-Shellcode Attacks Lab In this lab, we will learn how to exploit buffer overflow vulnerabilities to redirect program execution to injected shellcode. Lab Activities: 1. Creating Vulnerable C Program: First, let's create a vulnerable C program with a buffer overflow vulnerability. #include #include void vulnerable_function(char *input) { char buffer[64]; strcpy(buffe..
Shellcode Development Lab In this lab, we will learn how to write and execute custom shellcode for basic commands. Lab Activities: 1. Writing Custom Shellcode: To begin, let's create a simple C program that executes a basic shell command. #include #include int main() { system("/bin/bash"); return 0; } Save the above code to a file named shell.c and compile it: $ gcc -o ..
Cryptanalysis Exercises Cryptanalysis involves analyzing cryptographic systems to understand their vulnerabilities and weaknesses. Frequency Analysis: Frequency analysis is a classical cryptanalysis technique used to break substitution ciphers by analyzing the frequency of letters or symbols in the ciphertext. Brute Force Attacks: Brute force attacks involve systematically checking all ..
Implementation of Cryptographic Algorithms in Python Python is a popular programming language for implementing cryptographic algorithms due to its simplicity and rich libraries. Symmetric Encryption: Symmetric encryption algorithms such as AES and DES can be implemented in Python using libraries like pycryptodome. Asymmetric Encryption: Asymmetric encryption schemes like RSA can also be..