Skip to content

Stuff With Aurum

Where I do stuff

  • About

Tag: linux


Metasploitable 3 (Linux) Walkthrough: An Exploitation Guide

Posted on April 17, 2020 Updated on August 13, 2021

The Metasploitable virtual machine is an intentionally vulnerable image designed for testing security tools and demonstrating common vulnerabilities. Version 3… Read more

Share this:

  • Twitter
  • Facebook
  • LinkedIn
  • Reddit
  • More
  • Print
  • Tumblr
  • Pinterest
  • Pocket
  • Telegram
  • WhatsApp
  • Email

Like this:

Like Loading...
Tags: exploit, linux, Metasploit, Metasploitable, nmap     2 Comments     


Exploit Development: Stack Buffer Overflow

Posted on June 22, 2015

A stack buffer overflow occurs when a program writes more data to the stack than what is allocated to the… Read more

Share this:

  • Twitter
  • Facebook
  • LinkedIn
  • Reddit
  • More
  • Print
  • Tumblr
  • Pinterest
  • Pocket
  • Telegram
  • WhatsApp
  • Email

Like this:

Like Loading...
Tags: buffer overflow, edb, Kali Linux, linux     6 Comments     


Recent Posts

  • Creating an AWS Sandbox
  • Metasploitable 3 (Linux) Walkthrough: An Exploitation Guide
  • An Innovative Phishing Style
  • Linux (x86) Exploit Development Series
  • Exploit Development: Stack Buffer Overflow – Bypass NX/DEP

Recent Comments

  • 靶场练习 - Metaploitable1 - 清风. on Metasploitable Walkthrough: An Exploitation Guide
  • IS on Exploit Development: Stack Buffer Overflow – Bypass NX/DEP
  • Harjoitus 5 – Justuksen Blog on Metasploitable 3 (Linux) Walkthrough: An Exploitation Guide
  • Rikky on Metasploitable 3 (Linux) Walkthrough: An Exploitation Guide
  • Metasploitable 3 (Linux): An Exploitation Guide – Stuff With Aurum on Metasploitable 2 Walkthrough: An Exploitation Guide
BlogBD WordPress Theme
%d