• Hello and welcome to my first post. As a first exercise, today we are going to dissect a stack buffer overflow worm present that exploits a vulnerabilty present on the video game pokemon red and blue on gameboy. We will use reverse engineering technics. I choose to use gameboy because this architecture has no mitigation. It is a perfect example. Also the roms of gameboy are unpatchable. It is the definition of ROM: Read Only Memory.
    Created Fri, 05 Aug 2022 21:09:23 +0200
  • Hello and welcome to the book From 0 to buffer overflow. This book will teach you how to hack remotely a computer using memory corruption vulnerabilities. You will learn computer science about reverse engineering (dissect obscure computers and programs), vulnerability exploitation (code to break existing programs and remotely take over a computer) and cryptanalysis (cryptanalysis is a branch of the mathenmatics made to attack cryptography. Cryptography is math about to defend information.
    Created Thu, 04 Aug 2022 12:37:42 +0200