I am Preparing for the Offensive Security Certified Expert (OSCE) exam,
I hopped on exploitdb.com to find vulnerable software to exploit buffer overflows.
the best way to simulate finding a 0day, and exploiting it. 29 more words
Tags » Exploit
In the previous two tutorials we looked at how to exploit the vulnerable application with EIP as well as SEH based buffer overflow attacks.
This time we will have a look at how to exploit the application when DEP (Data Execution Protection) is enabled. 1,546 more words
The Chrome browser which we are all using is not as secure as it seems to be. It has got a vulnerability which is yet to be fixed. 230 more words