How can an ELF binary call a Windows API from WSL(2) to deploy a payload?

In September 2021 Black Lotus Labs (BLL) posted a blog entry discussing a payload loader that was:

written in Python
compiled to an ELF exe using PyInstaller in Debian in WSL
and "injected into a running process using Windows API cal… Continue reading How can an ELF binary call a Windows API from WSL(2) to deploy a payload?

What are the latest techniques/advances in binary exploitation? Conversely, latest advances in defending against them?

I know the wording might be off so bear with me a minute to explain what I’m trying to find:
If you never touched the topic, you start off with stack buffer overflows, then you learn about ret2libc, nop sleds and some other stuff. Then com… Continue reading What are the latest techniques/advances in binary exploitation? Conversely, latest advances in defending against them?

What are some exploitable memory corruption attacks I have not listed?

Dangling pointer(heap)
Use After Free(heap)
Double Free(heap)
Off by one(stack)
Integer Overflow(stack)
Unused Variable(stack and heap)
underrun(stack and heap)
race condition(stack and heap)

From what I’ve seen unused variable and under… Continue reading What are some exploitable memory corruption attacks I have not listed?

OverTheWire: Piping the password into a vulnerable program does not escalate privilege

I am solving behemoth0 and have successfully reverse engineered and understood how the program works. Here is my exploit for the vulnerable program.
#include <iostream>

#include <string>
#include <cstring>

int main() {
Continue reading OverTheWire: Piping the password into a vulnerable program does not escalate privilege