Stay up to date with Payatu blog


Stay up to date with Payatu blog

Close the overlay

I am looking for
Please click one!


TrendNet Wireless Camera buffer overflow vulnerability


CVE Details ID : Description TrendNet ProVi

Read more

Token Stealing with Windows Update KB4054518


Tokens, Accounts, Processes: On a Windows system, there are various user accounts, some are default to Windows and some are created explicitly. Some of the default user accounts are Local Service, Network Service and so on. Apart from user accounts there are also groups like Users, Everyone etc. Using AccessChk [2] privileges

Read more

Introduction of Tcache bins in Heap management


Understanding glibc malloc Painless intro to the Linux userland heap understanding the glibc heap implementation Heap Exploitation

Read more

Understanding Stack based buffer overflow


What is stack? A stack is a limited access data structure – elements can be added and removed from the stack only at the top. It works on LIFO(last-in-first-out) principle. Stack supports two operations push and pop. Push: Adds an item to the top of the stack. Pop: Removes an item from the top of the stack. Now lets examine the memory layout of a c program especially stack, it’s content and it’s working during function call and return.

Read more