Skip to main content

Pwn

Analysing the worst ransomware - part 4
·16 mins
Pwn
In the last part we’ve found heap buffer overflows in the structure holding victim information and a stack buffer overflow when receiving the name of the file that’s been encrypted. Now we’re going to find what possibilities they can offer us and use them to craft an exploit.