I was always curious about how the actual remote code execution occurs during the Insecure Deserialization
process. So I thought of giving a try to understand the known harmful gadgets
from commons-collections-3.2.2.jar
and develop the entire chain from scratch.
Canary Bypass
Linux binary
exploitation is a very interesting
topic. Thanks to my good friend vampire, he gave me this challenge and helped me to understand a stack canary
bypass technique.
Exploiting HP OpenView NNM - B.07.53
In DEFCON #16, there was an interesting session on HP OpenView NNM
exploitation “from bug to 0 day” presented by muts. While watching his walk-through, I found that this particular exploit development process was extremely intense and challenging. To better understand the concepts, I decided to take that as an exercise and try to reproduce the same in my local environment.