Introduction to Binary Exploitation| 0x00 | Bin Exp#1

1.What is Binary Exploitation

0xCyberzombie xdev
2 min readMar 29, 2021

2.Difference between 32-bit and 64-bit

3.Is Reversing, Disassembly, and Binary Exploitation are same?

My Channel :

Hi Friends, This is My first Blog About Binary Exploitation. I also have a Youtube channel where I post videos about Binary Exploitation and Reversing and Red Teaming. This is Intro to Binary Exploitation in the upcoming day’s I’ll post some Advanced topics which are related to Exploit Development.

Hope You Guys Enjoy This Blog….

1.What is Binary Exploitation?

Process of subverting a compiled application so that it violates some trust boundary in a way that is advantageous to an attacker.

It Includes two phases STATIC ANALYSIS and DYNAMIC ANALYSIS

Static Analysis is about testing the binary without running it.

Dynamic Analysis is about testing a binary by running it

2.Difference between 32bit and 64bit?

Historically we have only two types of processors that are 32bit and 64bit since the 1990s…

The 32bit processor is nothing but a processor which has a computing value of 2³²

In the same way, the 64bit processor is nothing but a processor which has a computing value of 2⁶⁴, not 2x32.

The 32bit processor register can only handle 4GB of RAM

but, The 64bit processor register can handle 16hexabyte of RAM it is several million times greater than 32bit.

3.Is Reversing, Disassembly, and Binary Exploitation are same?

however, the topics Reversing, Disassembly are different when it comes to Binary Exploitation it became a part of it.

Reverse Engineering is the Decompilation of the compiled program(application). Here we Only see the source code of the compiled binary in assembly language. Reversing is used in Cracking software, where Mitigations that are implemented to the binary are not Minded.

Disassembly is the process of obtaining the source code of the binary by giving the decompiler an input as Machine Code(Assembly code.)

Binary Exploitation includes both operations to compromise a machine in which the vulnerable binary is in a running state. Here our aim is to compromise the Machine. And it leads to creating an exploit(Exploit Development )

These are only the basics guys, In the feature, I also write blogs related to Advanced Topics

Make sure to follow me so that you never miss any blog, And also don’t forget to subscribe to my YouTube channel.

Happy Hacking….!!!

--

--