diff --git a/Medium/48.md b/Medium/48.md index d38f9c4..63ff609 100644 --- a/Medium/48.md +++ b/Medium/48.md @@ -217,7 +217,7 @@ Now scrolling down, we see that we have a hint towards a java command that's bei ![](prg/48_010.png) -In this giant java process being ran by root, we are hinted towards a **java debugging wire protocol** service, and it probably doesn't require any authentication. We also see that it listens on the local port **8000** , but probably only accepts localhost connections, so we're going to use a [SSH tunnel](../Tools/sshtunnels.md) to port forward the remote port 8000 to our local machine on port **8000** : +In this giant java process being ran by root, we are hinted towards a **java debugging wire protocol** service, and it probably doesn't require any authentication. We also see that it listens on the local port **8000** , but probably only accepts localhost connections, so we're going to use a [SSH tunnel](../Tools/sshtunnels/index.md) to port forward the remote port 8000 to our local machine on port **8000** : alexa@AI:~$ netstat -tulpen diff --git a/binexp.md b/binexp.md index 2cdcff2..3361045 100644 --- a/binexp.md +++ b/binexp.md @@ -6,7 +6,7 @@ [ Template Page ](0/0.md) -![](../assets/img/user.png) nihilist + ##### Preparing the Tools @@ -22,7 +22,7 @@ -![](../assets/img/user.png) nihilist + ##### 1) Beginner Reversing @@ -39,7 +39,7 @@ The basics of reversing with simple to understand examples -![](../assets/img/user.png) nihilist + ##### 2) Stack Buffer Overflows @@ -63,7 +63,7 @@ These are the most common binary exploits, they are there because of insecure fu -![](../assets/img/user.png) nihilist + ##### Assembly x86_64 @@ -79,7 +79,7 @@ As i hit the shellcode buffer overflow binary challenges, i realized that i need -![](../assets/img/user.png) nihilist + ##### 2) Stack Buffer Overflows (Part 2) @@ -111,7 +111,7 @@ As i hit the shellcode buffer overflow binary challenges, i realized that i need -![](../assets/img/user.png) nihilist + ##### 3) Bad Seed