Sunday, March 14, 2010

[TUTORIAL] Exploit Writting Tutorial From Basic To Intermediate

Exploit Writting Tutorial From Basic To Advanced

There are increasing number of bloggers who like to share thier knowledge in exploit especially the topic on how to create and write your own exploit.

In this post, I would like to combine the exploits tutorial that I have came across. This is not the comprehensive collection but at least its a good starting point for exploits beginners.


David Hoelzer tutorial that is intended for application/software developers from SANS Institude. For application/software developers, the overall presentation is meant to explain the basic concept of buffer overflow, how does it occurs, how to exploit it using manual/automation way and create the exploit using metasploit and automate the exploitation process.

The source code of the vulnerable server can be found on his blog.

The video tutorials can be downloaded here

-- Reference:


I consider this as intermediate and focus more on the real application exploit. Lupin from The Grey Corner explains exploit from basic to intermediate level with step by step debugging. Here is the summary:
  1. Stack Based Windows Buffer Overflow Tutorial -
  2. SEH Stack Based Windows Buffer Overflow Tutorial -
  3. Windows Buffer Overflow Tutorial: Dealing with Character Translation - 
  4. Heap Spray Exploit Tutorial: Internet Explorer Use After Free Aurora Vulnerability -
  5. Windows Buffer Overflow Tutorial: An Egghunter and a Conditional Jump -
-- Reference:


Peter Van Eeckhoutte is the first one who started this exploit tutorial (at least he is the first one who has provided most comprehensive guides on exploit development and keeps updating from time to time that I have ever seen).

Peter Van Eeckhoutte

  1. Exploit writting tutorial part 1:Stack Based Overflows -
  2. Exploit writting tutorial part 2: Stack Based Overflows - jumping to shellcode -
  3. Exploit writting tutorial part 3: SEH Based Exploits -
  4. Exploit writting tutorial part 3b: SEH Based Exploits - just another example -
  5. Exploit writting tutorial part 4: From Exploit to Metasploit - The basics -
  6. Exploit writting tutorial part 5: How debugger modules & plugins can speed up basic exploit development -
  7. Exploit writting tutorial part 6: Bypassing Stack Cookies, SafeSeh, SEHOP, HW DEP and ASLR -
  8. Exploit writting tutorial part 7: Unicode - from 0x00410041 to calc -
  9. Exploit writting tutorial part 8: Win32 Egg Hunting -
  10. Exploit writting tutorial part 9: Introduction to Win32 shellcoding -

-- Reference:

If you have any nice exploit tutorials, please feel free to leave a comment here to share with others :)


- Part 5 from grey-corner [24/04/2010]


Peter Van Eeckhoutte said...

thanks for the links !
spread the word...
and stay tuned (there is more to come)

I also published a write-up on a 0day vulnerability I recently found
You can find the write-ups on the Offensive Security Blog :

x9090 said...

Hi Peter,

Thanks for your sharing again.

Lets keep the knowledge free.



Stephen Bradshaw said...

Thanks for the links x9090!

I have part 5 of the exploit tutorial series posted as well.

Windows Buffer Overflow Tutorial: An Egghunter and a Conditional Jump

More are coming soon....

mr_me said...

nice work man, I have a few including a case study on a not so typical unicode vulnerability!

Anonymous said...

Nice posts .

Corelan did the best tutorial for exploit development.

Respect to Peter(c0relanc0d3f)


Unknown said...

oh.. nice article. I had learned something interesting with your post. thanks a lot. keep on updating.