Posts

Buffer Overflow

Image
                         Buffer Overflows                                                                 (The real hacking) I meant this real hacking cause , this is where you will be understanding the underlying code and then bypassing rather than relaying upon some tool to do the shit for you. Pre-requisite : You must have basic knowledge of assembly language Disclamer : Don't forget to put on a diving mask while reading this blog cause we are going to get deep So assuming you already have basic knowledge on assembly lets start learning reverse engineering by solving some challenges by protostar. Description : All the binary files we will be exploiting has owner and group owner as root and guess what ? it has setuid on it set :)  Challange 1 : Protostar Stac...

Persistence Techniques with Metasploit - Part 6

Image
     Persistence Techniques with Metasploit Getting a shell in real world requries a lot of hardwork and research , All this work put in so that we will be ok to loose the session when the user logs off or turns the computer off ? Hell no ! , we need to make our connection persistance so that we can get back alive when the computer's on or when the user logs in. And we will be taking a look into the post module section which helps us to make our connection persistence after exploiting the target machine. Note : For creating a persistence backdoor you should have already compromised the target machine and have the meterpreter shell  Pov : you have already exploited the target machine and had a meterpreter shell Commands :  use exploit/windows/local/persistence_exe show options Fig : 1.1 In Fig : 1.1 we can see the different options availabe REXENAME option defines the name of the exe file the module is going to put on the remote system REXEPATH denotes the local ...