Skip to content

Rogue Security

Looking under the hood

  • Home
  • About Me

Category: Buffer Overflow

  • Home
  • Buffer Overflow

Hack The Box : Calamity Privilege Escalation Writeup

January 20, 2018 roguesecurity1 Comment on Hack The Box : Calamity Privilege Escalation Writeup

Calamity machine on the hackthebox has finally retired. It was the toughest machine I have faced till now on HTB. The […]

Buffer Overflow, CTF, Reverse Engineering bof, ctf, gdb, hack the box, ret2libc

Buffer Overflow Series: Exploit failing outside gdb?

January 13, 2018 roguesecurity1 Comment on Buffer Overflow Series: Exploit failing outside gdb?

The most common issue we encounter while exploiting buffer overflow is that our payload works fine within gdb but fails […]

Buffer Overflow, Reverse Engineering bof, gdb, ret2libc
smashing the stack

Buffer Overflow Series: Smashing the Stack

July 30, 2017January 13, 2018 roguesecurity2 Comments on Buffer Overflow Series: Smashing the Stack

This is the continuation of my previous post where I explained how memory is organised. In this post, we will get […]

Buffer Overflow, Reverse Engineering bof, gdb
understanding stack layout

Buffer Overflow Series : Understanding the memory layout

July 16, 2017January 13, 2018 roguesecurity1 Comment on Buffer Overflow Series : Understanding the memory layout

Buffer overflow is the well known vulnerability in the info sec community. Back in early 2000  buffer overflow vulnerability was behind […]

Buffer Overflow, Reverse Engineering bof, gdb

Recent Posts

  • Methodology for Secure Code Review
  • Attacking and Defending Kubernetes Cluster
  • Docker 101 for busy pentesters
  • Docker commands cheatsheet
  • Abusing Nashorn for Remote Code Execution

Archives

  • February 2021
  • March 2020
  • February 2020
  • July 2019
  • December 2018
  • April 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • July 2017
  • May 2017

Categories

  • Attacks
  • Buffer Overflow
  • containers
  • CTF
  • General
  • kubernetes
  • Pentest
  • Reverse Engineering
  • Uncategorized

Subscribe



Copyright © 2022 Rogue Security Theme: Flash by ThemeGrill. Proudly powered by WordPress