Last week, we discussed about vulnerability analysis, exploit writing and being able to circumvent popular exploit mitigation techniques, to drive into it you do need to understand hardware/software/network. If you’re not, you may never be best pen tester!

If you are beginner in developing exploits, you still need to learn before trying to do these Stack Corruption, ERI Redirection, Executing Arbitrary Code, SPF Overwrite, Format String Bugs and etc… You can google “Exploiting” tutorials a lot, but I don’t want let your precious time to waste in searching here and there. Now I share Myne-us’s Exploting Development. Sure! You’ll be a master in exploiting development. 😀
Some tutorials do not require assembly language, as my opinion I’m not recommend you to learn it, Step by Step is easy to go’n come!

~Let’s start here~

Good luck!

Explore More

critical SQL injection (vulnerability) on Dhamma Web http://www.dhammaweb.net

PlanetCreator.Net’s Security Team member zai22 reported another critical SQL injection (vulnerability) on Dhamma Web http://www.dhammaweb.net SQL injection is a code injection technique that exploits a security vulnerability occurring in the

Basic MS-DOS commands

ADDUSERS – Add or list users to/from a CSV file ARP Address – Resolution Protocol ASSOC – Change file extension associations ASSOCIAT – One step file association AT – Schedule

Chinese schools deny Google cyber-attack links

Two Chinese schools have denied the New York Times inform which they were involved in the much-discussed cyber attacks upon Google as good as during slightest 33 alternative outfits sometime