1. Home
  2. Changelog
  3. Nix solves this
  4. 1. Research
    1. 1.1. Interesting Talks & Videos
  5. Exploitation
  6. 2. General Theory
    1. 2.1. C Language
      1. 2.1.1. Common Issues
    2. 2.2. System Architecture
      1. 2.2.1. x86 & IA32 Assembly
      2. 2.2.2. Memory & Program Layout (🚧)
      3. 2.2.3. Creating Shellcode
  7. 3. Strategy
    1. 3.1. Fuzzing (🚧)
    2. 3.2. Command Injection
    3. 3.3. Local Attacks & Code Pointers
      1. 3.3.1. Global Offset Table & Procedure Linking Table (🚧)
    4. 3.4. Performing Remote Attacks (🚧)
    5. 3.5. Privilege Escalation
  8. 4. Reverse Engineering
    1. 4.1. Analysing Binaries
    2. 4.2. Debugging 101
  9. 5. Binary Exploitation
    1. 5.1. Stack Overflows
    2. 5.2. String Vulnerabilities
    3. 5.3. Common Defenses
      1. 5.3.1. Canaries
      2. 5.3.2. No Execute
      3. 5.3.3. Address Space Layout Randomisation (ASLR)
      4. 5.3.4. Relocation Read-Only (RELRO)
    4. 5.4. Advanced Attacks
      1. 5.4.1. Return-Oriented Programming
      2. 5.4.2. ret2…
  10. Web
  11. 6. Web Exploitation
    1. 6.1. Template Injection
  12. Cryptography
  13. 7. Cryptography
    1. 7.1. Common Ciphers
    2. 7.2. Specific Attacks
      1. 7.2.1. Cracking ZIP Archives
  14. Forensics
  15. 8. Network Analysis
    1. 8.1. Wireshark
  16. 9. File Analysis
    1. 9.1. EXIF Metadata
    2. 9.2. Analysing OLE files (MS Word, Excel, PPT, …) (🚧)

My Little Security Wiki