my ISP blocks ports below < 1024... so I figured 8800 would be the next best thing ... @everybody : *always* be careful - port 80 will not make things safer than port 8800 ;) ____________________________________________________ Peter Van Eeckhoutte peter.ve@xxxxxxxxxx ____________________________________________________ My Blog : http://www.corelan.be:8800 (IPv4 and IPv6) Twitter : http://www.twitter.com/corelanc0d3r RIPE Handle PVE50-RIPE a.k.a. c0d3r/c0d3rZ/corelanc0d3r on various forums ____________________________________________________ From: CAS CAS [mailto:cas-security@xxxxxxxx] Sent: donderdag 12 november 2009 21:42 To: Peter Van Eeckhoutte; bugtraq@xxxxxxxxxxxxxxxxx Subject: RE: Exploit writing tutorials Hey why are you publishing tutorials on port 8800? Be carefull everybody > From: peter.ve@xxxxxxxxxx > To: bugtraq@xxxxxxxxxxxxxxxxx > Date: Tue, 10 Nov 2009 23:26:09 +0100 > Subject: Exploit writing tutorials > > Hi all, > > Just wanted to share the following links/tutorials on writing windows (stack based) exploits : > > * Stack based overflows (direct RET overwrite) : > (Tutorial Part 1) > http://www.corelan.be:8800/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/ > > * Jumping to shellcode : > (Tutorial Part 2) > http://www.corelan.be:8800/index.php/2009/07/23/writing-buffer-overflow-exploits-a-quick-and-basic-tutorial-part-2/ > > * Stack based overflows - SEH > (Tutorial Part 3) > http://www.corelan.be:8800/index.php/2009/07/25/writing-buffer-overflow-exploits-a-quick-and-basic-tutorial-part-3-seh/ > > * Stack based overflows - SEH part 2 > (Tutorial Part 3b) > http://www.corelan.be:8800/index.php/2009/07/28/seh-based-exploit-writing-tutorial-continued-just-another-example-part-3b/ > > * Writing Metasploit exploits > (Tutorial Part 4) > http://www.corelan.be:8800/index.php/2009/08/12/exploit-writing-tutorials-part-4-from-exploit-to-metasploit-the-basics/ > > * Using debuggers to speed up exploit development > (Tutorial Part 5) > http://www.corelan.be:8800/index.php/2009/09/05/exploit-writing-tutorial-part-5-how-debugger-modules-plugins-can-speed-up-basic-exploit-development/ > > * Bypassing Stack Cookies, Safeseh, NX/DEP and ASLR > (Tutorial Part 6) > http://www.corelan.be:8800/index.php/2009/09/21/exploit-writing-tutorial-part-6-bypassing-stack-cookies-safeseh-hw-dep-and-aslr/ > > * Writing stack based unicode exploits > (Tutorials Part 7) > http://www.corelan.be:8800/index.php/2009/11/06/exploit-writing-tutorial-part-7-unicode-from-0x00410041-to-calc/ > > > > ____________________________________________________ > > Peter Van Eeckhoutte > peter.ve@xxxxxxxxxx > ____________________________________________________ > > My Blog : http://www.corelan.be:8800 (IPv4 and IPv6) > Twitter : http://www.twitter.com/corelanc0d3r > RIPE Handle PVE50-RIPE > a.k.a. c0d3r/c0d3rZ/corelanc0d3r on various forums > ____________________________________________________ > > > > This transmission is intended only for use by the intended recipient(s). If you are not an intended recipient you should not read, disclose, copy, circulate or in any other way use the information contained in this transmission. The information contained in this transmission may be confidential and/or privileged. If you have received this transmission in error, please notify the sender immediately and delete this transmission including any attachments. ________________________________________ Hotmail: Trusted email with powerful SPAM protection. Sign up now. This transmission is intended only for use by the intended recipient(s). If you are not an intended recipient you should not read, disclose, copy, circulate or in any other way use the information contained in this transmission. The information contained in this transmission may be confidential and/or privileged. If you have received this transmission in error, please notify the sender immediately and delete this transmission including any attachments.