LibHTTPD1.2 | SLMail5.5 | Exploiting Crossfire | Egghunters | Advanced Offensive Techniques
- GDB-PEDA Debugger/Exploit Development Extension
- Controlling EIP
- Writing Proof-of-concept
- Bad Character Analysis
- Successful Exploitation
- SLMail 5.5 and Immunity Debugger
- Fuzzing
- Taking Control of EIP
- Eliminating Bad Characters
- Locating JMP ESP Instruction and ASLR Bypass
- Exploiting the Target
- Control of Execution
- Multi-Stage Shellcode
- Exploiting the Crossfire Application
- Fuzzing/Proof-of-Concept
- Hijacking Execution and Short-Jumping to Egghunter Space
- Generating the Egghunter
- Locating Buffer-space for the Shellcode
- Exploitation Attempt
- Rpivot Usage
- Using Tor-over-VPN
- Offensive Shell Passing
- Offensive Proxy ARP Bridges

