Series: Basics of Linux Binary Exploitation


I am quite passionate about exploiting binary files. The first time when I came across Buffer Overflow(a simple technique of exploitation), then I was not able to implement the same with the same copy of code on my system. The reason for that was there was no consolidated document that would guide me thoroughly to write a perfect exploit payload for the program in case of system changes. Also, there are very few descriptive blogs/tutorials that had helped me exploiting a given binary. I have come up with the consolidation of Modern exploitation techniques (in the form of the tutorial) that will allow you to understand exploitation from scratch.

Rohit Sehgal
Rohit Sehgal
Travel, Code, Help and Excel

My research interests include Web Application security, Linux System security, Development and DevSecOps. And yes, I love nature, and nature photography.

comments powered by Disqus