Next example, we will use dd to carve a JPEG image from a chunk of RAW data. By itself, this is not a real useful exercise. There are lots of tools out [...]
One function we might find useful would be the ability to split images up into usable chunks, either for archiving or for use in another program. [...]
In this case, I will try to analyze the file able2.dd
The first step we have to do is check, how many partitions in the file able2.dd.
Do it with the [...]
This time we will try to exploit Metasploitable linux.
What the Metasploit Linux???
Metasploitable is an intentionally vulnerable Linux virtual machine. [...]
For the first time, we must make the process Information Gathering to find out what ports are open on the target/
Do this by typing the command # nmap-sV [...]
In classic stack based buffer overflow, the buffer size is big enough to hold the shellcode.
But, what will happen if there is not enough consecutive [...]