in this section i’m going to archive some of interesting exploits i saw you can learn lots of things from them !
1- one of first real-world HW-DEP bypass Exploit by devcode : here
2- bypassing DEP by returning into HeapCreate by toto : here
3- first public ASLR bypass exploit by using partial overwrite by skape : here
4- heap spray and bypassing DEP by skylined : here
5- first public exploit that used ROP for bypassing DEP in adobe lib TIFF vulnerability : here (is this case ASLR bypass is possible !)
6- exploit codes of bypassing browsers memory protections : here
7- Cesar Cerrudo PoC’s on Tokken TokenKidnapping . PoC for 2k3: here , PoC 2k8: here
8- Tavis Ormandy KiTra0d an exploit works from win 3.1 to win 7 . PoC here (metasploit updated module works more interesting !)
9- old ms08-067 metasploit module multi-target and DEP bypass PoC here
10- PHP 6.0 Dev str_transliterate() Buffer overflow – NX + ASLR Bypass (using ROP and Brute Forcing ASLR) PoC here
11- Stephen Fewer SMBv2 Exploit . PoC here
note 1 :there is lots of other interesting exploits in windows platform you can just find them in here and also here .
note 2: i saw lots of other great and advanced exploits in commercial packages . (they are commercial so forget them ;) )
===================================================
in this section i’m going to archive some books about windows exploitation.
1- Exploiting Software How to Break Code By (Greg Hoglund, Gary McGraw)
2- The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities (By Mark Dowd , John McDonald )
3- Buffer Overflow Attacks: Detect, Exploit, Prevent (by James C. Foster)
4- Windows Internals (by Mark Russinovich , David A. Solomon, Alex Ionescu)
6- Software Vulnerability Guide ( by HERBERT H. THOMPSON , SCOTT G. CHASE)
7- ADVANCED WINDOWS DEBUGGING (by Mario Heward , Daniel Pravat)
8- Reversing: Secrets of Reverse Engineering
9- great step by step exploit writing tutorials by my friend Peter Van Eeckhoutte :
also he wrote a cool immunity debugger PyCommand called PveFindAddr i think this python script is necessary for speed-up exploit development for newbie or expert exploit developers and i found it so useful , it have some cool features like finding instructions for code reuse and ROP also finding state of memory protections and finding best return address in your situation.
this is not complete lits of exploitation related book / articles list i just listed those have windows specific chapters .
Starrin g : T.B.A
1- exploitation is not and will not die.
2- just will change and being more harder also won’t be ” just for fun” like before.
3- writing reliable exploits will take time and time == money and now exploit development is acceptable specific job in security area !
4- fame == money as well (also is lovely by itself) . so you will see other great researches in various security fields ;)
5- if you read all of resources exist in post you can be a great exploit developer ; )