Blog

Stay up to date with Payatu blog

Blog

Stay up to date with Payatu blog

Close the overlay

I am looking for
Please click one!

11/05/2020

TrendNet Wireless Camera buffer overflow vulnerability



munawwar

CVE Details ID : https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12763 https://payatu.com/advisory/trendnet-wireless-camera-buffer-overflow-vulneribility Description TrendNet ProVi

Read more
05/07/2019

Token Stealing with Windows Update KB4054518



Siddhant-Badhe

Tokens, Accounts, Processes: On a Windows system, there are various user accounts, some are default to Windows and some are created explicitly. Some of the default user accounts are Local Service, Network Service and so on. Apart from user accounts there are also groups like Users, Everyone etc. Using AccessChk [2] privileges

Read more
13/03/2019

Introduction of Tcache bins in Heap management



Gaurav-Nayak

Understanding glibc malloc Painless intro to the Linux userland heap understanding the glibc heap implementation Heap Exploitation

Read more
15/01/2018

Understanding Stack based buffer overflow



Siddharth-Bezalwar

What is stack? A stack is a limited access data structure – elements can be added and removed from the stack only at the top. It works on LIFO(last-in-first-out) principle. Stack supports two operations push and pop. Push: Adds an item to the top of the stack. Pop: Removes an item from the top of the stack. Now lets examine the memory layout of a c program especially stack, it’s content and it’s working during function call and return.

Read more