SQL Injections
Posted on Tue 02 December 2014 in Web Hacking • Tagged with web, sql injection, python
A walkthrough of some reasonably advanced SQL injection techniques and exploitation
Continue reading
Posted on Tue 02 December 2014 in Web Hacking • Tagged with web, sql injection, python
A walkthrough of some reasonably advanced SQL injection techniques and exploitation
Posted on Thu 23 October 2014 in Linux Kernel Hacking • Tagged with kernel development, linux, c, rootkit, kernel hacking
Building a basic rootkit for hiding files from normal operating system commands on Linux
Posted on Tue 30 September 2014 in Reverse Engineering • Tagged with linux, 32bit, debugging, reverse engineering
Posted on Wed 24 September 2014 in Reverse Engineering • Tagged with windows, reverse engineering, debugging
Posted on Sat 09 August 2014 in Web Hacking • Tagged with web, xss, pentesteracademy
Posted on Wed 06 August 2014 in x86-32 Linux • Tagged with exploit development, linux, 32bit, fuzzing, buffer overflow, rop, ret2libc
Exploiting a buffer overflow by using return to libc and basic return orientated programming to beat certain protections including never execute (NX)
Posted on Sat 02 August 2014 in Reverse Engineering • Tagged with windows, reverse engineering, 32bit, crackme
Posted on Thu 10 July 2014 in Linux Kernel Hacking • Tagged with kernel development, linux, c, rootkit, kernel hacking, function hooking
Hooking kernel functions on Linux, used by usermode applications, for malicious purposes
Posted on Mon 07 July 2014 in x86-32 Linux • Tagged with exploit development, linux, 32bit, aslr, buffer overflow
Exploiting a buffer overflow vulnerability with address space layout randomization in place
Posted on Fri 04 July 2014 in Web Hacking • Tagged with web, xss, responsible disclosure
Finding and exploiting cross site scripting vulnerabilities in the Nagios plugin PNP4Nagios