--[ Contenido
1 - Introduccion
2 - Antes de empezar
2.1 - Conocimientos previos
2.2 - Herramientas
3 - Creando un exploit local
3.1 - Creando un programa vulnerable
3.2 - Programando una shellcode
3.3 - Creando un exploit
4 - Creando otro exploit local
4.1 - Programando una shellcode
4.2 - Creando un exploit
4.3 - Solucion de problemas
5 - Haciendo mas estandar nuestro exploit
6 - Creando un exploit remoto
6.1 - Creando un programa vulnerable
6.2 - Programando una shellcode
6.3 - Creando un exploit
7 - Referencias
8 - Agradecimientos
[Enlace externo eliminado para invitados]
Código: Seleccionar todo
{******************************************************************************}
{** WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING **}
{******************************************************************************}
{** **}
{** The prototypes, declarations and information in this file has been **}
{** compiled from various sources as well as through reverse engineering **}
{** techniques. We make no guarantee as to the correctness of the contents. **}
{** Caution is recommended, USE AT YOUR OWN RISK. **}
{** **}
{******************************************************************************}