@pr3dat0r
please don't discourage or make fun of others.
Type: Posts; User: H@CK3R_ADI
@pr3dat0r
please don't discourage or make fun of others.
I accept my fault here at <+8>
And regarding function main the assembled code do the following:
<+0>Value of ebp is pushed on stack
<+1>Value of ebp is pushed on esp
<+3>Then it calls the Display
<+8>Before telling this...
aha vuln detected see at line char buff[8]
it reads from:
0 1 2 3 4 6 7 8 9
this can be used for malicious code execution
Do u have any good IDE for Asm
buffer overflow is not difficult............are you yourself learnining and then making vids?
thanks for such a nice vids marc....
As the title says on which topic you would like a webinar...please suggest some unique topics. and what about making a webicon because attending a hacking conference is expensive so I think of an...
Your blog contains information in such way that a 10 years old kid can understood and one who is beginner can easily understand......nice articles
and what about .................webinars?
As the title says what about organising hacking competitions in the every last week of the month
As we all know computer only understands Binary Language but the question arises how the computer translates sound in binary I mean how the computer translates your voice,tunes,etc... into binary...
Yes it seems to be fantasy I know but until you can't dream you can't make it you all are right(My friend is also laughing on me ) and thank you you Anant for giving me a good advice.
This is just a theory to explain I'm going to do practical(R&D) and regarding the short-circuit breakers I already think about that to hijack short-circuit breaker I'm not going to directly do...
Hello to all garagians few days ago I got an idea ........what about making cyber bombs
Theory:
First of All we will access Microprocessor then the power-control unit and do some volatge...
gr8 post buddy like fb12hs said you can also write abook on it.
This can be used to bypass security sys(s) just load val in reg then into mem...What do you think........What about use this to execute malicious code
what about doing indirect overflow that first load it on regs and then into memory
Hello to all Garagians yesterday I got an Idea what about doing EAX overflow I just wanted to know what do you think about this IDEA ....
Your questions,comments,suggestions,etc....are welcome
If u know C/C++ there is a book name Guide to Assembly Language it will teach you asm in very nice way it was published by Springer.
I agree with both of you and now I'm learning python it is very easy.............
I used many years ago and now I forget it only remembered few operator...etc like diamond operator,etc.... now I want to learn python do u have any good tut on python and metsploit earlier used to...
Hello to all Garagians........as title says this is a poll on Python vs. perl please give one reason why u like that language.
Thanks for this pal....I'm not absolute beginner but I want to learn php....LOL
Mate see OS is not Microlithic or monolithicits kernel iscalled by these terms there are many type of kernel :-
Monolithic
Microlithic
Modular
Hybrid
Exo-Kernel
I hope you are an OS...