Achal Tiwariachaltiwari.hashnode.dev·Jul 22, 2024ShellCode 1.0Hey there! Today, we're diving into the fascinating and somewhat intimidating world of shellcode. If you've ever wondered how hackers manage to take control of a compromised machine, shellcode is often a big part of the answer. Let's break it down to...DiscussMalware
Gaurav Chaudharypixelgig.pro·Mar 31, 2024Learning Cyber Security Day 5 - Common Coding Vulnerabilities🥉Hey security-conscious coders! We've been fortifying our code with encryption and secure coding practices. Today, we shift gears and delve into the enemy's playbook – common coding vulnerabilities that hackers exploit to gain access to systems and st...DiscussCybersecurity Bootcamp: My Daily Grind to Expertisecybersecurity
Jyotiprakash Mishrablog.jyotiprakash.org·Dec 28, 2023Secure Coding in CWriting secure code in C is crucial to preventing common vulnerabilities such as buffer overflows, injection attacks, and more. Here are some ways to enhance the security of your C code: Input Validation: Ensure that all user inputs are validated an...DiscussC Programmingbounds checking
Anusha Shanbhoganushaa.hashnode.dev·Oct 16, 2023Buffer OverflowWhat is a Buffer? A buffer is a portion of physical storage memory designated for the temporary storage of data during its transfer from one location to another. Typically, these buffers are situated in Random Access Memory (RAM) and serve the purpos...Discuss·4 likes·110 reads#cybersecurity
VJ XI0xeleven.me·Sep 24, 2023Memory OverviewWhen a program is loaded into the memory in the Windows Operating System. it sees an abstract view of the memory. This means that the program doesn't have access to the full Memory; instead, it only has access to its Memory. For that program, that is...Discusshacking
Hung Ngohungoboss.hashnode.dev·Sep 7, 2023Buffer Overflow and ExploitationBuffer overflows are as old as the world itself. Even though it is not that fresh, it is still one of the most exploited vulnerabilities that can often lead to other vulnerabilities. When I was younger, I was originally taught how to code in C, the l...Discuss·28 readsexploit
Sergei Zaiatshacking4ra.men·Sep 27, 2020Buffer Overflow 101Introduction What is a Buffer Overflow? In information security and programming, a buffer overflow, or buffer overrun, is an anomaly where a program, while writing data to a buffer, overruns the buffer’s boundary and overwrites adjacent memory loca...DiscussRoad to OSCPpentesting