πŸ“–
Notes
search
⌘Ctrlk
πŸ“–
Notes
  • πŸ™ŒWelcome!
  • CyberSecurity
    • Penetration Testing
      • ELearnSecurity
      • PortSwigger
      • TryHackMe
        • Main Methodology
          • 1. Reconnaissance
          • 2. Enumeration/Scanning
          • 3. Gaining Access / Exploitation
            • Buffer Overflow
              • 1. Immunity Debugger
              • 2. Mona Setup
              • 3. Spiking
              • 4. Fuzzing
              • 5. Crash Replication & Controlling EIP
              • 6. Finding Bad Characters
              • 7. Find a Jump Point
              • 8. Generate Payload
              • 9. Prepend NOPs
              • 10. Final Buffer
            • Cryptography
            • Evasion Techniques
            • Shells
            • Web Applications
            • Windows Applications
          • 4. Post Exploitation
          • 5. Covering Tracks
          • 6. Reporting
        • Networking Concepts
        • Scripting
        • Web Extensions
      • Miscellaneous
    • Blue Teaming
  • DevOps
    • Infrastructure as a Code (IaC)
    • Orchestration
  • Development
    • Blockchain
    • Backend
    • Database
    • Testing
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. CyberSecuritychevron-right
  2. Penetration Testingchevron-right
  3. TryHackMechevron-right
  4. Main Methodologychevron-right
  5. 3. Gaining Access / Exploitation

Buffer Overflow

Stack based buffer overflow

1. Immunity Debuggerchevron-right2. Mona Setupchevron-right3. Spikingchevron-right4. Fuzzingchevron-right5. Crash Replication & Controlling EIPchevron-right6. Finding Bad Characterschevron-right7. Find a Jump Pointchevron-right8. Generate Payloadchevron-right9. Prepend NOPschevron-right10. Final Bufferchevron-right
Previous3. Gaining Access / Exploitationchevron-leftNext1. Immunity Debuggerchevron-right

Last updated 2 years ago