Last week, we discussed about vulnerability analysis, exploit writing and being able to circumvent popular exploit mitigation techniques, to drive into it you do need to understand hardware/software/network. If you’re not, you may never be best pen tester!

If you are beginner in developing exploits, you still need to learn before trying to do these Stack Corruption, ERI Redirection, Executing Arbitrary Code, SPF Overwrite, Format String Bugs and etc… You can google “Exploiting” tutorials a lot, but I don’t want let your precious time to waste in searching here and there. Now I share Myne-us’s Exploting Development. Sure! You’ll be a master in exploiting development. 😀
Some tutorials do not require assembly language, as my opinion I’m not recommend you to learn it, Step by Step is easy to go’n come!

~Let’s start here~

Good luck!

Explore More

Hacking Your Computer – Physical Access is Total Access

Hacking Your Computer – Physical Access is Total Access Table of Contents -Disclaimer -Introduction Part 1: Gaining Access -LiveCDs -Windows Option 1: Cracking the Password -Windows Option 2: Circumventing the

Cracking WPA FAST with video cards!

By now, pretty much everyone has heard that it is easy to hack into WEP protected networks. As we have seen in our Cracking WEP article, it is terribly easy.

SQL injection (vulnerability) on Myanmar Climate Change Watch http://www.tunlwin.com/

PlanetCreator reported another critical SQL injection (vulnerability) on Myanmar Climate Change Watch http://www.tunlwin.com/ SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer