The pen testing world is constantly changing, and threat actors are continually finding new ways to exploit organizations of all industries and sizes. For pen testers to safely and efficiently test and expose security weaknesses, they enlist the help of different tools.
This article series from cybersecurity expert Ricardo Narvaja provides tips and tricks on reversing and exploiting Windows using free and easy to get tools.
- Part 1 - Installing Tools
- Part 2 - Solving the Exercise Stack1 Using x64dbg
- Part 3 - How to Analyze Stack1 and Stack2
- Part 4 - Analysis With Stack3 and Stack4
- Part 5 - Analysis of Stack4 Using IDA Free
- Part 6 - Solving ABO1 Using RADARE
- Part 7 - Analysis and Resolution of ABO2 in GHIDRA
- Part 8 - Solving ABO3 with IDA Free
- Part 9 - Solving ABO4 with RADARE
- Part 10 - Adding Different Protections and Mitigations
- Part 11 - ROP Bypass of the DEP
- Part 12 - Reversing in 64 Bits
- Part 13 - 64 bits RESOLVER
- Part 14 - Determining ROP Difficulty (Part 1)
- Part 15 - Determining ROP Difficulty (Part 2)
For demonstration purposes only.
Checkout the full series Reversing and Exploiting With Free Tools Series.