Steamed rice ROP_X86 learning summary
Relevant accessories for steamed rice Interested in downloading
Learn some ROP notes of steamed rice and write a summary by yourself
What is ROP
The full name is return oriented programming. The core is to use the return instruction to control the execution order. As an advanced memory attack technology, it can bypass various simple defenses ...
Added by smokey20 on Fri, 08 Oct 2021 21:43:59 +0300
Fancy stack overflow
Fancy stack overflow
reference resources: https://ctf-wiki.org/pwn/linux/user-mode/stackoverflow/x86/fancy-rop/#2018-over
reference resources: https://www.yuque.com/hxfqg9/bin/erh0l7
reference resources: https://ctf-wiki.org/pwn/linux/user-mode/stackoverflow/x86/fancy-rop
1. Principle
1.1 stack pivoting
Stack pivoting is turned into s ...
Added by beckjo1 on Tue, 05 Oct 2021 01:44:29 +0300
Intranet penetration to quickly realize remote desktop
1. Preface
When it comes to remote desktop, you may think of third-party software such as TeamViewer and sunflower
However, most of them are commercial software, which is expensive; Even if the free version is provided, there are various restrictions, and the stability and security cannot be guaranteed
This article will introduce how to use ...
Added by paul2463 on Fri, 01 Oct 2021 20:30:24 +0300
HCIA Notes - --ACL Access Control List
ACL Access Control List
Functions:
1. Access Restrictions - Match traffic on router traffic-in or-out interfaces and then restrict them
2. Define traffic of interest
Introduction to ACL:
1. From top to bottom, match one by one, the previous match is executed as above, not the next
2. Calls to the ACL list are divided into in (matching the ...
Added by RedDragon on Sun, 19 Sep 2021 22:31:59 +0300
Design and implementation of simple network early warning system
The course design of this course in intrusion prevention technology and application hopes to help your course design or project
1, Topic content
1.1 Problem Description:
Based on network sniffing, a simple network early warning system is designed and implemented to decode / decode and detect the characteristics of the captured packet ...
Added by Karpathos on Mon, 13 Sep 2021 06:25:06 +0300