Imagine you found a vulnerability in a web server and decided to take over that machine to do your dirty deeds, what do you do? Well, for starters, you have to figure out how to exploit the vulnerability at hand. In this article I will talk only about buffer overflows abused to inject a shellcode and execute arbitrary commands.
read more....http://morgawr.github.io/hacking/2014/03/29/shellcode-to-reverse-bind-with-netcat/
read more....http://morgawr.github.io/hacking/2014/03/29/shellcode-to-reverse-bind-with-netcat/