Skip to main content

Posts

Showing posts from December, 2016

Exploit Development on Linux Platform Part - 5

Exploiting the  Vulnerable Code on Linux  Introduction     Welcome to module 5, the last module of this workshop. So far in this workshop, we have been learning about debugging and how to work with GDB in Linux and, most importantly, controlling the EIP register. Prrequisite      It is strongly recommended that you should first complete the previous four modules of this workshop and then start completing this module.                   In this module, we will try to go to the level of exploitation while getting help from GDB so that we know how we can develop exploit in Linux. Controlling EIP           We have already presented how to control EIP in our previous module and what role GDB can play in debugging and giving you information about registers.       Now, let’s focus on first having a small shellcode which we can create easily and as we need. To demonstrate exploitation we need to have a shellcode. Download shellcode generator          You can do