FROM SKID
TO RING0
welcome to my personal space - all my research and writeups will be contained here and can be accessed via the blog portion of the website.
root@kali:~/exploits$ cat exploit.py
from pwn import *
target = remote('10.10.10.5', 1337)
padding = b"A" * 512
eip = p32(0xdeadbeef) # Overwrite EIP
nop_sled = b"\x90" * 32
payload = padding + eip + nop_sled + shellcode
log.info(f"Sending {len(payload)} bytes...")
target.sendline(payload)
target.interactive()
$ python3 exploit.py
[+] Opening connection to 10.10.10.5 on port 1337: Done
[*] Sending 844 bytes...
[*] Switching to interactive mode
$ whoami
root
$ _
/ABOUT-ME
an infrastructure engineer based in london documenting his journey transitioning into offsec and red teaming. a repository which houses things i find interesting such as vulnerability research, exploit development and ctf writeups
Recent Projects
Security Research & Development