Open in app

Sign In

Write

Sign In

Aditya Chaudhary
Aditya Chaudhary

50 Followers

Home

Lists

About

Jul 23, 2021

Windows Print Spooler — A True Nightmare

This is a technical article describing the PrintNightmare vulnerability, its impact and remediation process for different endpoints and servers. A remote code execution vulnerability exists when the Windows Print Spooler service improperly performs privileged file operations. An attacker who successfully exploited this vulnerability could run arbitrary code…

Remote Code Execution

3 min read

Windows Print Spooler — A True Nightmare
Windows Print Spooler — A True Nightmare
Remote Code Execution

3 min read


Feb 8, 2019

SLAE 0x5: Part III — Analyzing MSFvenom ‘linux/x86/meterpreter/bind_tcp’ shellcode

In this post we will analyse linux/x86/meterpreter/bind_tcp shellcode. If you haven’t read the part I, you can start from there: SLAE 0x5: Part I — Analyzing MSFvenom ‘linux/x86/exec’ shellcode Analyzing MSFvenom shellcodesmedium.com Shellcode is basically a list of carefully crafted instructions that can be executed once the code is injected into a running application. …

Slae

4 min read

SLAE 0x5: Part III — Analyzing MSFvenom ‘linux/x86/meterpreter/bind_tcp’ shellcode
SLAE 0x5: Part III — Analyzing MSFvenom ‘linux/x86/meterpreter/bind_tcp’ shellcode
Slae

4 min read


Feb 8, 2019

SLAE 0x5: Part II — Analyzing MSFvenom ‘linux/x86/meterpreter/reverse_tcp’ shellcode

In this post we will analyse linux/x86/meterpreter/reverse_tcp shellcode. If you haven’t read the part I, you can start from there: SLAE 0x5: Part I — Analyzing MSFvenom ‘linux/x86/exec’ shellcode Analyzing MSFvenom shellcodesmedium.com Shellcode is basically a list of carefully crafted instructions that can be executed once the code is injected into a running application. …

Shellcode

4 min read

SLAE 0x5: Part II — Analyzing MSFvenom ‘linux/x86/meterpreter/reverse_tcp’ shellcode
SLAE 0x5: Part II — Analyzing MSFvenom ‘linux/x86/meterpreter/reverse_tcp’ shellcode
Shellcode

4 min read


Feb 8, 2019

SLAE 0x5: Part I - Analyzing MSFvenom ‘linux/x86/exec’ shellcode

In this post we will analyse linux/x86/exec shellcode. Shellcode is basically a list of carefully crafted instructions that can be executed once the code is injected into a running application. Stack and heap-based buffer overflows are the most popular way of doing so. I would recommend that you should do…

Slae

6 min read

SLAE 0x5: Part I — Analyzing MSFvenom ‘linux/x86/exec’ shellcode
SLAE 0x5: Part I — Analyzing MSFvenom ‘linux/x86/exec’ shellcode
Slae

6 min read


Feb 5, 2019

SLAE 0x4: Shellcode Random Insertion Encoder

This post is about writing an insertion encoder for Linux/x86 shellcodes. I would recommend you should go through shellcoding basics before spending some time here. Some basics first… Shellcode is basically a list of carefully crafted instructions that can be executed once the code is injected into a running application…

Slae

3 min read

SLAE 0x4: Shellcode Encoder
SLAE 0x4: Shellcode Encoder
Slae

3 min read


Feb 3, 2019

SLAE 0x3: Egg Hunter Shellcode

Let’s consider a scenario where for some reason (maybe limited memory space) our entire shellcode can’t be placed into memory. To make the scenario much easier to understand, we can take an example of a simple buffer overflow. What if when we try to exploit buffer overflow the memory looks…

Slae

4 min read

SLAE 0x3: Egg Hunter Shellcode
SLAE 0x3: Egg Hunter Shellcode
Slae

4 min read


Jan 27, 2019

SLAE 0x2: Linux/x86 Reverse Shellcode

Let’s go through some of the basics. Shellcode is basically a list of carefully crafted instructions that can be executed once the code is injected into a running application. Stack and heap-based buffer overflows are the most popular way of doing so. A reverse shell is a type of shell…

Slae

6 min read

SLAE 0x2: Linux/x86 Reverse Shellcode
SLAE 0x2: Linux/x86 Reverse Shellcode
Slae

6 min read


Jan 7, 2019

SLAE 0x1: Linux/x86 Bind Shellcode

Before diving into the technicalities, let’s go through some of the basics. Shellcode is basically a list of carefully crafted instructions that can be executed once the code is injected into a running application. Stack and heap-based buffer overflows are the most popular way of doing so. A bind shell…

Slae

7 min read

SLAE 0x1: Linux/x86 Bind Shellcode
SLAE 0x1: Linux/x86 Bind Shellcode
Slae

7 min read


Jul 17, 2018

Insecure Deserialization

Huh, well this sounds like fun. Let’s see if it’s really that fun… This story began not so long ago. As always some hackers found a way to exploit the deserialization process. This so called insecure deserialization vulnerability was so severe that it nailed its name in the OWASP Top…

Insecure Deserialization

4 min read

Insecure Deserialization
Insecure Deserialization
Insecure Deserialization

4 min read

Aditya Chaudhary

Aditya Chaudhary

50 Followers

Cyber Security Analyst [https://adityachaudhary.me]

Following
  • PCMag

    PCMag

  • Alberto Romero

    Alberto Romero

  • Vickie Li

    Vickie Li

  • B/O Trading Blog

    B/O Trading Blog

  • Martin Thissen

    Martin Thissen

See all (31)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech