Last week, we discussed about vulnerability analysis, exploit writing and being able to circumvent popular exploit mitigation techniques, to drive into it you do need to understand hardware/software/network. If you’re not, you may never be best pen tester!

If you are beginner in developing exploits, you still need to learn before trying to do these Stack Corruption, ERI Redirection, Executing Arbitrary Code, SPF Overwrite, Format String Bugs and etc… You can google “Exploiting” tutorials a lot, but I don’t want let your precious time to waste in searching here and there. Now I share Myne-us’s Exploting Development. Sure! You’ll be a master in exploiting development. 😀
Some tutorials do not require assembly language, as my opinion I’m not recommend you to learn it, Step by Step is easy to go’n come!

~Let’s start here~

Good luck!

Explore More

MyanmarCyberSecurityTeam (MCST)

Today, I got a news from one of my stuff tat, Some Security Researchers from Myanmar are comming out, ya!. Named themselves “MyanmarCyberSecurityTeam or MCST“, WoW! So many hackers (Black

Login Bypass vulnerability of Myanmar Sites (Fixed)

Last week PlanetCreator informed Security Weakness of Myanmar Uready http://www.myanmaruready.com/ and Su Aung Phyo Co., Ltd. http://www.suaungphyo.com to their webmaster and fixed as long as we reported. SQL injection is

DNS disaster: first attacks reported

The first attacks that are likely to have stemmed from a serious Domain Name System flaw have been reported. Dan Kaminsky (Credit: Kaminsky’s blog) The existence of the Domain Name