Jul 4, 2021 - 5 min read
Pentesting
-
Executing Windows Shellcode in Golang
There are a plethora of reasons as to why you may want to have a custom written shellcode runner, Whether that be to Avoid Detection or Aid in Portability there are also a plethora of ways and languages to write one in from C all the way down to PowerShell. Today i’m going to show you how to use native Golang functions to use the Windows API to execute a Meterpreter Shell.
Jul 4, 2021 - 5 min read -
Privilege escalation with Docker
Today we are going to learn how to Elevate our Privileges in a Linux system using Docker. Docker What is Docker? Docker is a set of platform as a service products that uses OS-level virtualization to deliver software in packages called containers. Containers are isolated from one another and bundle their own software, libraries and configuration files; they can communicate with each other through well-defined channels. How does docker lead to privesc When an admin allows an un-privileged user access to the ‘docker’ group it allows us to make use of the docker CLI to create containers.
Jul 5, 2020 - 4 min read -
Buffer Overflow: Overwriting the Return Value
In this tutorial I will walk you through the process of overwriting the return value of an application using a Buffer Overflow. Requirements :
- A Linux System (i686 or x64) [Disable Kernel Buffer Overflow Protection]
- A basic understanding of the stack
- A willingness to learn
Why would we do this? As far as I am concerned there is no legitimate use for this technique however it is a useful skill to possess and understand how a Buffer Overflow works. Understanding these concepts will help you develop more secure applications.
What is a “Buffer Overflow”? Well put simply a buffer overflow is an attack vector where you attack an application by overflowing the memory location of a buffer leading to code leaking into the next memory location. This usually causes a Segmentation Fault (SIGSEGV in linux). Using this we can execute arbitrary code or cause the application to execute another piece of code within the application by overwriting the return value.
Will this harm my computer? Using this guide will not harm your computer unless you do something terribly wrong. Feel free to use a virtual machine.
Sep 23, 2016 - 4 min read