![Photo by Syed Ali on Unsplash](https://res.cloudinary.com/fluid-attacks/image/upload/v1620331216/blog/vulnserver-trun-rop/cover_fyj5gk.webp)
Andres Roldan
Exploiting Vulnserver with ROP
This post will show how to create a complete, functional exploit creating a complex shellcode using ROP.
![Photo by Pierre Binet on Unsplash](https://res.cloudinary.com/fluid-attacks/image/upload/v1620331065/blog/reversing-vulnserver/cover_u4n10o.webp)
Andres Roldan
The devil is in the details
This post will show how use reverse engineering techniques and tools to find vulnerabilities on Vulnserver.
![Photo by Philipp Katzenberger on Unsplash](https://res.cloudinary.com/fluid-attacks/image/upload/v1620331199/blog/vulnserver-kstet-alternative/cover_rpkuwo.webp)
Andres Roldan
Sideloading exploiting
This post will show how to exploit the Vulnserver KSTET command loading the payload from an external source.
![Photo by Kevin Ku on Unsplash](https://res.cloudinary.com/fluid-attacks/image/upload/v1620331206/blog/vulnserver-lter-seh/cover_basr0i.webp)
Andres Roldan
Bad chars everywhere
This post will show how to exploit the Vulnserver LTER command on where we will need to bypass bad chars restrictions.
![Photo by Ganapathy Kumar on Unsplash](https://res.cloudinary.com/fluid-attacks/image/upload/v1620331152/blog/vulnserver-kstet/cover_raeprd.webp)
Andres Roldan
Exploiting in stages
This post will show how to exploit the Vulnserver KSTET command using a socket reuse method.
![Photo by Roberto Gomez Angel on Unsplash](https://res.cloudinary.com/fluid-attacks/image/upload/v1620331144/blog/vulnserver-gmon/cover_yohcmp.webp)
Andres Roldan
Exceptions are good
This post will show how to exploit the Vulnserver GMON command using Structured Exception Handling (SEH) overwrite.
![Photo by Florian Klauer on Unsplash](https://res.cloudinary.com/fluid-attacks/image/upload/v1620331149/blog/vulnserver-gter-no-egghunter/cover_tsjvux.webp)
Andres Roldan
Every byte counts
In this post, we will use an alternative way of exploiting Vulnserver GTER command.
![Photo by Annie Spratt on Unsplash](https://res.cloudinary.com/fluid-attacks/image/upload/v1620331147/blog/vulnserver-gter/cover_prsww3.webp)
Andres Roldan
Hunting eggs
This post will describe the steps taken to exploit the Vulnserver GTER command, using a technique called 'Egghunting.'
![Photo by David Rangel on Unsplash](https://res.cloudinary.com/fluid-attacks/image/upload/v1620331211/blog/vulnserver-trun/cover_squjnn.webp)
Andres Roldan
From zero to shell
This post will describe the steps taken to exploit the Vulnserver TRUN command using a direct EIP overwrite strategy.