📌
Pentest Notes
CtrlK
  • NETWORK
    • Internal Networks
      • Relays
        • IPV4
        • IPV6 With MITM6
      • Domain Enumeration
      • Bruteforcing and Password Spraying
      • Credential Access and Dumping
        • Mimikatz
        • Creating LSASS Dumps
      • Password Cracking
      • New Domain Admin
      • PowerShell One-Liners
      • File Shares
      • Kerberos
      • Endpoint Protection Evasion
        • Easy Wins
    • External Networks
      • Enumeration
        • Gobuster
        • Eyewitness
      • Office 365
        • Ruler
    • Red Teaming
      • Forced Authentication
      • Redirectors
      • Code Execution
      • DNS Redirector Setup
      • SMTP Redirector
    • Wireless
      • Boost Signal Strength
      • Bettercap
      • Cracking
    • Misc
      • Penetration Testing Notes and Commands
        • Useful Commands
          • Windows
            • Elevate to SYSTEM from Administrator
            • Disable Windows Activation Check
        • Misc PowerShell One-liners
  • Malware
    • Execution
      • Process Enumeration and Injection With Parent Process Name Check
      • DLL Side-Jacking
      • Excel 4.0 Macros
    • Detection Avoidance
      • Pwsh XOR
      • AMSI Bypass
      • Encrypter
      • Resource Encrypter
    • Other
      • bintoByte.py
  • Binary Exploitation
    • General
      • Methodology
      • Locating Bad Charecters
      • Useful Resources
    • SEH Overflow
    • Custom Shellcode
      • EXP-301 Module 0x07 Notes
      • EggHunter
      • ROP Decoder
    • Reverse Engineering
      • Windbg Notes
      • IDA Pro
      • Assembly
    • Memory Protection
      • ASLR
        • Module 0x0a
        • Extra Mile - Custom_srvr.exe Exploit
      • DEP
        • Module 0x09
        • Extra Mile 9_4_1_1
    • Format String Attacks
    • Example Exploits
      • Intelligent Management Center (iMC)
      • Sync Breeze v10.0.28
      • Adventech WebAccess SCADA
    • Fuzzing
      • WinAFL
        • Installation
        • Testing Coverage
        • Harness with Example
        • Testing Harness
        • Command Line Arguements
  • Mobile
    • Android
      • ADB Debuging
      • Sign APK
    • iOS
      • Rooting iOS
  • Game Hacking
    • Unity
      • IL2CPP
      • Change From Release to Debug
    • Assembly Resources
    • Cheat Engine Tutorial
  • Misc
    • Windows Internals
      • Event Viewer
      • RPC
        • RPC Enumeration
        • RPC Endpoints
        • Server Interaction
          • RPC Procedure Enumeration
    • Hardware
      • Cold Boot Attacks
      • Direct Memory Access (DMA) Attacks
Powered by GitBook
On this page

Was this helpful?

  1. Binary Exploitation
  2. Memory Protection

ASLR

Module 0x0aExtra Mile - Custom_srvr.exe Exploit
PreviousMemory ProtectionNextModule 0x0a

Was this helpful?