Computer Forensic - Introduction

Computer forensics deals with collecting the evidence of a good information system in the form of hardware or software and can be used as legal evidence in court. Slack space or sometimes referred to as file slack is the area between the end of a file and end of the last cluster or sector used by the file in question. Area is an area that will not be used again to store the information there, so the area is "wasted"...

Posted by
SinggihTKJ

More

DVWA Medium Exploitation

In this post, I'll try to show how to gain a root access through a web application. There are a lot of method to do that, this is one of them. The web application that will be used is DVWA(Damn Vulnerable Web Application). You can download it here. Start up your MySQL and Apache on backtrack. type : #service apache2 start type : #service mysql start Open DVWA on your browser type : localhost dvwa Login...

Posted by
SinggihTKJ

More

Buffer Overflow (SEH) on Ezserver

- The First, install Ezserver on windows xp and running -  we do information gathering by way of scanning the destination IP ago with the help of "nmap" we scan for open ports and their operating systems are targeted: (ip target = 172.16.227.128) # Nmap -v -sV -A -o -p 1-65535 172.16.227.128 - after that we know port 8000 is open and target using windows xp, so that when we make our fuzzer know the steps...

Posted by
SinggihTKJ

More

Buffer Overflow BigAnt Server SEH

This time, I will try to explain how to use the software with SEH protection system called BigAnt Server. SEH exception handler is to protect the EIP to be overflowing with abnormal flow in the software. This forces us to use a different attack vectors and techniques because if we use the same technique as in Back Direct exploitation of the attack will not work because of SEH. - Create Fuzzer with python  this...

Posted by
SinggihTKJ

More
Diberdayakan oleh Blogger.

Copyright © 2025/ scxo2oco71

Template by : Urang-kurai / powered by :blogger