Tutorial written by Covert Systems Research. It defines several of the common types of vulnerabilities together with their counterpart command line exploit sequences. The descriptions of these types of vulnerabilities range from stack to heap, function pointer and format string weaknesses. This whitepaper has been developed to help those seeking to improve their exploitation skills while also aiming to give the reader the knowledge for a more surgical aspect to manipulating vulnerable programs.
df7d9d5f892763880a05d4e45b7e6b4aa2abc083b26886bb80971593a3d97615
A simple and versatile sniffer utility to monitor ports 21 (FTP) and 110 (POP) for quick accumulation of user and password strings.
847db033bdacbf08f6a22d1dd2fbd88f7df4a357677aad3960d6352d6ba97e8e