API Call Tracing - PEfile, PyDbg and IDAPython

http://securityxploded.com/api-call-tracing-with-pefile-pydbg-and-idapython.php



exploit writing tutorial part

http://cdpython.tistory.com/28



리눅스 메모리 영역

0xC0000000 ~ 0xFFFFFFFF의  1GB 영역에대한 조사

ZONE_DMA, ZONE_NORMAL, ZONE_HIGHMEM

http://hooneyo.tistory.com/entry/%EC%98%81%EC%97%ADZone

http://blog.naver.com/declspec/10143230888

http://www.makelinux.net/books/lkd2/ch11lev1sec2

http://www.iamroot.org/xe/Kernel_9_ARM/184935


메모리 설명 + brk


memory.ppt


Technical Information on Vulnerabilities of Hypercall Handlers

http://www.exploit-db.com/wp-content/themes/exploit/docs/34859.pdf


Breaking the Sandbox

http://www.exploit-db.com/wp-content/themes/exploit/docs/34591.pdf


Not so fast my friend - Using Inverted Timing Attacks to Bypass Dynamic Analysis

http://labs.lastline.com/not-so-fast-my-friend-using-inverted-timing-attacks-to-bypass-dynamic-analysis

'공부 할 것' 카테고리의 다른 글

공부공부  (0) 2014.10.28
재밋을듯  (0) 2014.10.14
detour library - window api hooking support  (0) 2014.08.29

The Geometry of Innocent Flesh on the Bone:

Return-into-libc without Function Calls (on the x86)

'공부 할 것' 카테고리의 다른 글

공부공부  (0) 2014.10.28
재밋을듯  (0) 2014.10.14
detour library - window api hooking support  (0) 2014.08.29

http://www.sysnet.pe.kr/Default.aspx?mode=2&sub=0&detail=1&wid=631


윈도우에서 제공


한번 실습 ㄱ

'공부 할 것' 카테고리의 다른 글

공부공부  (0) 2014.10.28
재밋을듯  (0) 2014.10.14
detour library - window api hooking support  (0) 2014.08.29

+ Recent posts