There are many things that every Penetration Tester and Bug Bounty Hunter does during blackbox testing of web application. These repetitive things cost a lot of time during penetration testing, and the time is usually short. Facing these obstacles, I have created a tool that automates many activities and increases work efficiency (it is still in development phase).

This article describes workflow that I am using during Web Application Penetration Testing with scope “*.domain.com”. My research is based on the OWASP methodology and the methodology contained in the book “Hack Tricks” written by Carlos Polop. For the purposes of this…


Writeup includes — SROP with mprotect() NX bypass [x64]

This is my 9th walkthrough referring to the methodology described here.
It will be as always:

  • concise,
  • straight to the point.
  • without the steps that lead to the rabbit hole.

0. Download the binary:


Writeup includes — Format string, Buffer Overflow, and ROP with PIE & NX & ASLR & Stack Canary bypass [x64]

This is my 8th walkthrough referring to the methodology described here.
It will be as always:

  • concise,
  • straight to the point.
  • without the steps that lead to the rabbit hole.

0. Download the binary:


Writeup includes — User After Free && Heap overflow [x32]

This is my 7th walkthrough referring to the methodology described here.
It will be as always:

  • concise,
  • straight to the point.
  • without the steps that lead to the rabbit hole.

0. Download the binary:


Writeup includes — Egg hunting && shellcode writing [x32]

This is my 6th walkthrough referring to the methodology described here.
It will be as always:

  • concise,
  • straight to the point.
  • without the steps that lead to the rabbit hole.

0. Download the binary:


Writeup includes — format string vulnerability [x32]

This is my 5th writeup referring to the methodology described here.
It will be as always:

  • concise,
  • straight to the point.
  • without the steps that lead to the rabbit hole.

0. Download the binary:


Writeup includes — SC & ASLR & NX bypass and double pointer tips [x64]

This is my fourth walkthrough referring to the methodology described here.
It will be as always:

  • concise,
  • straight to the point.
  • without the steps that lead to the rabbit hole.

0. Download the binary:


Walkthrough includes — Buffer overflow, ASLR & NX bypass [x64]

This is my third walkthrough referring to the methodology described here.
It will be as always:

  • concise,
  • straight to the point.
  • without the steps that lead to the rabbit hole.

0. Download the binary:


Writeup includes — Format string, PIE & FULL RELRO bypass [x64]

This is my second walkthrough referring to the methodology described here.
It will be as always:

  • concise,
  • straight to the point.
  • without the steps that lead to the rabbit hole.

0. Download the binary:


Walkthrough includes— Buffer overflow and shell coding [x32].

This is my first walkthrough referring to the methodology described here.
It will be:

  • concise,
  • straight to the point.
  • without the steps that lead to the rabbit hole.

0. Download the binary:

Karol Mazurek

Penetration Tester

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store