Learn Exploit Development by Yaksas CSC

A dedicated place to host our research in Exploit Development and Reverse Engineering

Home About Hands-on Fuzzing and Exploit Development course Acknowledgements Blog Yaksas CSC

Developing local stack overflow exploit for FTP Commander Pro 8.03

In this post, we will create a local buffer overflow exploit for FTP Commander Pro 8.03. FTP Commander Pro is a FTP client used for transferring files. The vulnerability lies in the Custom Command feature that takes an arbitrary command from the user and executes it on the FTP server.

Read More

Developing remote SEH overwrite exploit for Integard Pro 2.2.0.9026

In this post, we will create a remote buffer overflow exploit for Integard 2.0.0.9016. Integard is a web filtering tool. The vulnerability lies in the NoJS parameter that is sent from the web administrator interface.

Read More

CloudMe Sync 1-11-0 - Local Stack-based Buffer Overflow Powershell

The following post explain how to exploit a stack-based buffer overflow vulnerability in CloudMe Sync v1.11.0 via PowerShell

Read More

DeviceViewer 3.12.0.1 (SEH Overwrite exploit)

This assignment was submitted by Michael Ross (@mprossau) as part of our Hands-on Exploit Development Course

Read More

JetAudio jetCast Server 2.0 (Stack-based buffer overflow exploit)

This assignment was submitted by Michael Ross (@mprossau) as part of our Hands-on Exploit Development Course

Read More

Creating Linux TCP Bind Shellcode

The TCP bind shell is used to setup a listener (or server) on the target machine which allows the attacker machine to execute commands on the said machine.

Read More

Welcome to Exploit-RE!

This website will hold resources dedicated to Exploit Development and Reverse Engineering

Read More