struct and typedef of C programming lanugage
C is really powerful system programming language. I believe most of experienced hacker,penetration tester,exploit developer has knowledge of C Language(At least basic). I am not professional or regular...
View Articlestruct,typedef,array and pointer [all togther?]
This post is part of http://www.pusheax.com/2013/03/struct-and-typedef-of-c-programming.html . Such as struct, pointer, typedef example. I have did some more advanced things with struct:#include...
View ArticleUbuntu 12.10 Local Root Exploit
Everybody know Ubuntu is a popular Linux distro(Basically for newbie). Today i was visiting exploitdb and found the Ubuntu 12.10 Local root exploit which worked only on 64bit. I have tested the code...
View ArticleBacktrack reborn as Kali - downloaded Kali Linux
BackTrack Reborn as Kali Linux. Yesterday i have downloaded Kali Linux from http://www.kali.org/downloads/ which has gnome as default DE (Classic mode) . Most penetration testers knows about Backtrack...
View ArticleExploit writing - Stack based Buffer overflow
There are many exploit writing tutorials. But the corelan's exploit writing tutorials are much much better. If you want to learn exploit development , of course you may get started with corelan too....
View ArticlePort scanning using pbnj!
Recently i installed Kali Linux on Vmware workstation. There was a tool called pbnj which can scan port and store results in mysql database. Sometime it is useful storing vulnerable assessment into...
View Article(N)ASM windows MessageBox , import dll
Mostly i use NASM, GCC, LD for programming practices! Because I use Linux as my primary Operating system, So i love to use cross-platform application.I am not an asm coder, in past i have searched a...
View ArticleMy first shellcode was in two registers, The adduser shellcode!
I always tried to learn to write simple shellcode in assembly language. But writing the shellcode was not my first interest , my interest was Exploit writing. I had to learn to understand assembly...
View Article(N)ASM LoadLibrary,GetProcAddress and MessageBox!
When i was reading shellcode writing tutorial The LoadLibrary and GetProcAddress was been just confused me. But it was really easy to understand in normal asm code. It was bit harder for me when i...
View ArticleContent spoofing attack (Brother of Reflected XSS)!
Content spoofing is altering data/text of web pages. XSS uses <script> or any other JS (E.G: <script>alert(1)</script> whereas Content spoofing not. It can be using text or html...
View ArticleNew page of pusheax.com on Facebook !!!
There is a new page created on Facebook to keep updated of all new and important post. Join :https://www.facebook.com/pages/pusheaxcom/373711796082900========pusheax.com
View ArticleExploit writing>>> SEH based!
Today i have re-exploited a software called mp3-nator. SEH based is bit challenging. I am going to show you quickly that how i exploited this SEH based vulnerable using only following tools:1. Immunity...
View ArticleGetting started in pentesting!!!
You also want to get started with pentesting & hacking? There are thousands of guys want to get started with pentesting and hacking but they don't have any clue that where they should start. So i...
View ArticleUseful books to get into hacking!
A good book can take you so far. Having some good book really a good idea to learn something new and improving our knowledge. I have posted some useful book's amazon link (no matter how you get them)....
View ArticleEasy example of...
I have written quick example of few function such as strspn(),strrchr(),strchr(),strbrk(),memcpy() etc of C language.These function we often use for dealing with string. These code are very easy to...
View Articledebian apt-get or aptitude update Hash Sum mismatch
We need "apt-get update" to update the debian source list if we want to upgrade debian to next release. When i was going to upgrade debian , i got error "Hash Sum mismatch" something like: W: Failed to...
View Articlewindows socket programming in c++ , your first socket(networking) program!
Windows socket programming in c/c++ was frustrating for me when it was first time. But winsock2 is not that hard to make your basic networking program in few minutes. Today i will explain the basic of...
View ArticleBrute force attack & dictionary password cracking using hydra
Brute force attack and Dictionary password cracking attack is still effective. Brute force attack can be more effective if the hacker has good knowledge in password profiling,information gathering....
View ArticleCompiling c++ multiple sources file
c++ multiple sources file compiling using g++ is easy but it requires a little manual works. Multiple source file compiling can be more easy and straight using make file. But i will give here only a...
View ArticleHow to use IBM AppScan Software to scan website - Found tutorial on...
AppScan is a web vulnerability scanner. I used it before but did not make a tutorial on this. But i got a very basic tutorial on centralhacker.com and wanted to share with you guys!Read:...
View Article