thegreycorner.com
The Grey Corner: Python gdb Disassembly Extension 1.20
http://www.thegreycorner.com/2014/05/python-gdb-disassembly-extension-120.html
A blog focused on the related subjects of software exploitation, penetration testing and computer incident detection and response. Sunday, May 4, 2014. Python gdb Disassembly Extension 1.20. Ive released version 1.20 of my Python gdb Debugging Extensions, which I have now renamed to pygdbdis. The introductory page for the extensions is here. If you want to refresh your memory on what it does. Heres a screenshot of what the fifodisplay output looks like using iTerm2 on OSX. In the top left pane is the...
thegreycorner.com
The Grey Corner: May 2014
http://www.thegreycorner.com/2014_05_01_archive.html
A blog focused on the related subjects of software exploitation, penetration testing and computer incident detection and response. Sunday, May 4, 2014. Python gdb Disassembly Extension 1.20. Ive released version 1.20 of my Python gdb Debugging Extensions, which I have now renamed to pygdbdis. The introductory page for the extensions is here. If you want to refresh your memory on what it does. Heres a screenshot of what the fifodisplay output looks like using iTerm2 on OSX. In the top left pane is the...
thegreycorner.com
The Grey Corner: June 2011
http://www.thegreycorner.com/2011_06_01_archive.html
A blog focused on the related subjects of software exploitation, penetration testing and computer incident detection and response. Saturday, June 25, 2011. SEH Based Buffer Overflow Tutorial for Vulnserver. I wrote this tutorial on exploiting an SEH based vulnerability in Vulnserver a while back and am just getting around to posting a link for it here now that some formatting issues have been sorted. Its at the InfoSec Institute site once more. Posted by Stephen Bradshaw. Links to this post. SpiderLabs B...
thegreycorner.com
The Grey Corner: February 2013
http://www.thegreycorner.com/2013_02_01_archive.html
A blog focused on the related subjects of software exploitation, penetration testing and computer incident detection and response. Saturday, February 16, 2013. It's official. My own entry. In the Hackers Database. What is the Hackers Database? What is the main goal of the Hacker Database? Known as the HDB). Posted by Stephen Bradshaw. Links to this post. Subscribe to: Posts (Atom). View my complete profile. Five Attributes of an Effective Corporate Red Team. A Shadow of our Former Self. Industry Report: ...
thegreycorner.com
The Grey Corner: Version 0.5 of SSL Testing Tool ssltest.pl
http://www.thegreycorner.com/2015/03/version-05-of-ssl-testing-tool-ssltestpl.html
A blog focused on the related subjects of software exploitation, penetration testing and computer incident detection and response. Monday, March 16, 2015. Version 0.5 of SSL Testing Tool ssltest.pl. Added support for scanning versions 1.1. and 1.2 of TLS. Updated cipher list for the newer versions of OpenSSL. The new list is quite a bit bigger than that of the previous version, but specific support depends on your underlying OpenSSL library. Chris Mahns, from whom I. Borrowed the initial codebase and ide...
thegreycorner.com
The Grey Corner: December 2011
http://www.thegreycorner.com/2011_12_01_archive.html
A blog focused on the related subjects of software exploitation, penetration testing and computer incident detection and response. Saturday, December 3, 2011. Restricted Character Set Buffer Overflow Tutorial for Vulnserver. The title says it all. You can find the tutorial here. Posted by Stephen Bradshaw. Links to this post. Stack based buffer overflow. Windows stack based buffer overflow. Subscribe to: Posts (Atom). View my complete profile. Restricted Character Set Buffer Overflow Tutorial . Hendy Chu...
thegreycorner.com
The Grey Corner: My Python gdb Extensions
http://www.thegreycorner.com/2013/10/my-python-gdb-extensions.html
A blog focused on the related subjects of software exploitation, penetration testing and computer incident detection and response. Sunday, October 20, 2013. My Python gdb Extensions. If you started to learn reverse engineering and exploit development on 32 bit Windows systems as I did, you were probably very unimpressed when you first attempted to try out your skills on *nix machines and started (trying to) use gdb. I know I was. Gdb lookin like Olly! If you're running this on OSX, please note that the X...
thegreycorner.com
The Grey Corner: December 2012
http://www.thegreycorner.com/2012_12_01_archive.html
A blog focused on the related subjects of software exploitation, penetration testing and computer incident detection and response. Saturday, December 8, 2012. DEP Bypass Tutorial for Vulnserver. Check out the tutorial here. Ive only given it a quick skim so far, but based on what Ive seen it looks pretty good. Posted by Stephen Bradshaw. Links to this post. Subscribe to: Posts (Atom). View my complete profile. DEP Bypass Tutorial for Vulnserver. SpiderLabs Blog from Trustwave. Bake your own EXTRABACON.
thegreycorner.com
The Grey Corner: Vulnserver
http://www.thegreycorner.com/p/vulnserver.html
A blog focused on the related subjects of software exploitation, penetration testing and computer incident detection and response. Vulnserver is a Windows based threaded TCP server application that is designed to be exploited. The program is intended to be used as a learning tool to teach about the process of software exploitation, as well as a good victim program for testing new exploitation techniques and shellcode. The program supports no other command line options. Links to this post. CommonCollectio...
SOCIAL ENGAGEMENT