lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <C0641B79F7D6A44791BA8FA35BC143F9010E4FC79EC5@apollo.corelan.be>
Date: Thu, 12 Nov 2009 21:48:09 +0100
From: Peter Van Eeckhoutte <peter.ve@...elan.be>
To: CAS CAS <cas-security@...e.com>,
	"bugtraq@...urityfocus.com" <bugtraq@...urityfocus.com>
Subject: RE: Exploit writing tutorials

my ISP blocks ports below < 1024... so I figured 8800 would be the next best thing ...

@everybody : *always* be careful - port 80 will not make things safer than port 8800 ;)





____________________________________________________

Peter Van Eeckhoutte
peter.ve@...elan.be
____________________________________________________

My Blog : http://www.corelan.be:8800 (IPv4 and IPv6)
Twitter : http://www.twitter.com/corelanc0d3r
RIPE Handle PVE50-RIPE
a.k.a. c0d3r/c0d3rZ/corelanc0d3r on various forums
____________________________________________________

From: CAS CAS [mailto:cas-security@...e.com]
Sent: donderdag 12 november 2009 21:42
To: Peter Van Eeckhoutte; bugtraq@...urityfocus.com
Subject: RE: Exploit writing tutorials

Hey why are you publishing tutorials on port 8800?

Be carefull everybody


> From: peter.ve@...elan.be
> To: bugtraq@...urityfocus.com
> Date: Tue, 10 Nov 2009 23:26:09 +0100
> Subject: Exploit writing tutorials
>
> Hi all,
>
> Just wanted to share the following links/tutorials on writing windows (stack based) exploits :
>
> * Stack based overflows (direct RET overwrite) :
> (Tutorial Part 1)
> http://www.corelan.be:8800/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/
>
> * Jumping to shellcode :
> (Tutorial Part 2)
> http://www.corelan.be:8800/index.php/2009/07/23/writing-buffer-overflow-exploits-a-quick-and-basic-tutorial-part-2/
>
> * Stack based overflows - SEH
> (Tutorial Part 3)
> http://www.corelan.be:8800/index.php/2009/07/25/writing-buffer-overflow-exploits-a-quick-and-basic-tutorial-part-3-seh/
>
> * Stack based overflows - SEH part 2
> (Tutorial Part 3b)
> http://www.corelan.be:8800/index.php/2009/07/28/seh-based-exploit-writing-tutorial-continued-just-another-example-part-3b/
>
> * Writing Metasploit exploits
> (Tutorial Part 4)
> http://www.corelan.be:8800/index.php/2009/08/12/exploit-writing-tutorials-part-4-from-exploit-to-metasploit-the-basics/
>
> * Using debuggers to speed up exploit development
> (Tutorial Part 5)
> http://www.corelan.be:8800/index.php/2009/09/05/exploit-writing-tutorial-part-5-how-debugger-modules-plugins-can-speed-up-basic-exploit-development/
>
> * Bypassing Stack Cookies, Safeseh, NX/DEP and ASLR
> (Tutorial Part 6)
> http://www.corelan.be:8800/index.php/2009/09/21/exploit-writing-tutorial-part-6-bypassing-stack-cookies-safeseh-hw-dep-and-aslr/
>
> * Writing stack based unicode exploits
> (Tutorials Part 7)
> http://www.corelan.be:8800/index.php/2009/11/06/exploit-writing-tutorial-part-7-unicode-from-0x00410041-to-calc/
>
>
>
> ____________________________________________________
>
> Peter Van Eeckhoutte
> peter.ve@...elan.be
> ____________________________________________________
>
> My Blog : http://www.corelan.be:8800 (IPv4 and IPv6)
> Twitter : http://www.twitter.com/corelanc0d3r
> RIPE Handle PVE50-RIPE
> a.k.a. c0d3r/c0d3rZ/corelanc0d3r on various forums
> ____________________________________________________
>
>
>
> This transmission is intended only for use by the intended recipient(s). If you are not an intended recipient you should not read, disclose, copy, circulate or in any other way use the information contained in this transmission. The information contained in this transmission may be confidential and/or privileged. If you have received this transmission in error, please notify the sender immediately and delete this transmission including any attachments.
________________________________________
Hotmail: Trusted email with powerful SPAM protection. Sign up now.

This transmission is intended only for use by the intended recipient(s).  If you are not an intended recipient you should not read, disclose, copy, circulate or in any other way use the information contained in this transmission.  The information contained in this transmission may be confidential and/or privileged.  If you have received this transmission in error, please notify the sender immediately and delete this transmission including any attachments.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ