Anonforce
boot2root machine for FIT and bsides guatemala CTF
Jason in JavaScript everything is a terrible mistake.
Meet the world’s most powerful hacker dog!
Let’s find out what his agent is up to….
Gaming Server
Buff is pretty straightforward: Use a public exploit against the Gym Management System, then get RCE. Do some port-forwarding, then use another exploit (buffer overflow against Cloudme Sync) to get Administrator access.
A bind shellcode listens on a socket, waiting for a connection to be made to the server then executes arbitrary code, typically spawning shell for the connecting user. This post demonstrates a simple TCP bind shellcode that executes a shell.
slae assembly tcp bind shellcode