首页 > 数据库技术 > 详细

Linux Interactive Exploit Development with GDB and PEDA

时间:2014-11-03 10:07:49      阅读:784      评论:0      收藏:0      [点我收藏+]

Exploit Development Process
● Occupy EIP
● Find the offset(s)
● Determine the attack vector
● Build the exploit
● Test/debug the exploit

peda 是一款由python寫的exploit開發工具。

Peda setup and usage

http://security.cs.pub.ro/hexcellents/wiki/kb/toolset/peda

slides.pdf

Unofficial guide by Hexcellents
github repo (latest)
bhus12-workshop.tar.gz | workshop-solution.tar.gz | telnetd exploit (by syndrowm)
screenshot1 | screenshot2
demo video (by Tri Van)

Linux Interactive Exploit Development with GDB and PEDA

原文:http://www.cnblogs.com/bittorrent/p/4070447.html

(0)
(0)
   
举报
评论 一句话评论(0
关于我们 - 联系我们 - 留言反馈 - 联系我们:wmxa8@hotmail.com
© 2014 bubuko.com 版权所有
打开技术之扣,分享程序人生!