Writing exploits requires to perform several steps to achieve the final purpose of the attack.
find a vulerability
reverse engineer the bug
achieve code execution
write the payload
profit
This post will focus on the later step: write the payload.
The payload can spawn a shell, reuse a socket or do a connect back. But sometimes we will need a more complex payload that will need to open a file, change some permissions, do some mmap, etc.
more here..............http://radare.today/payloads-in-c/
find a vulerability
reverse engineer the bug
achieve code execution
write the payload
profit
This post will focus on the later step: write the payload.
The payload can spawn a shell, reuse a socket or do a connect back. But sometimes we will need a more complex payload that will need to open a file, change some permissions, do some mmap, etc.
more here..............http://radare.today/payloads-in-c/