Skip to content

Latest commit

 

History

History
13 lines (11 loc) · 579 Bytes

README.md

File metadata and controls

13 lines (11 loc) · 579 Bytes

Vulnerability-Exploitation

memory overflows

These exploit experiments exploited a few well-known vulnerabilities and gained root privilege as result.

web server

Reverse engineered a web server using IDA pro and explored its vulnerabilities. Sploit1 bypassed DEP and successfully gained root access. Sploit2 bypassed ASLR and successfully gained root access.

website

a, b, c, d, e exploits/accomplishes, respectively, Cookie Theft, CSRF, SQL injection, Password Theft and XSS.