Home
Articles
Community
Discord
Tools
Merchandise
Training
About
Terms of Use
Home
Articles
Community
Discord
Tools
Merchandise
Training
About
Terms of Use
Posts:
All
Active Directory
Certificates
Cisco
Cons and Seminars
Corelan Free Tools
Crypto
CSO
Debugging
Development
Exploit Writing Tutorials
Exploits
Fuzzing
Juniper
Legal
Linux and Unix
Malware and Reversing
Metasploit
mona
MS Exchange
Networking
OpsMgr
Outlook
Papers
Penetration testing
Pentesting
Powershell
Private
Root Cause Analysis
Scripts
Security
Sharepoint
SQL Injection
Storage
Tools
Uncategorized
Video
Virtualization
Web Application Security
Windows Client OS
Windows Internals
Windows Server
Wordpress
Metasploit Bounty – the Good, the Bad and the Ugly
On June 14, 2011 HD Moore announced the Metasploit Bounty contest, offering a cash incentive for specific vulnerabilities to be submitted as modules in the Metasploit Framework. Titled "30 exploits, $5000 in 5 weeks", a post on the Rapid7 blog lists the 30 "bounties" selected by the MSF team, waiting for someone to claim and submit a working exploit module.
Read more
Read More
Installing Watobo on BackTrack 5
Watobo author Andy Schmidt made 2 great videos about installing Watobo on Windows and on BackTrack 5. I created a rather simple and short shell script to install Watobo on BT5. Nothing new, nothing sensational, just to alleviate the installation process.
Read more
Read More
mona.py – the manual
This document describes the various commands, functionality and behaviour of mona.py. Released on june 16, this pycommand for Immunity Debugger replaces pvefindaddr, solving performance issues and offering numerous new features. pvefindaddr will still be available for download until all of its functionality has been ported over to mona.
Read more
Read More
ROP your way into B-Sides Las Vegas 2011
Ahh.. Vegas.. What happens in Vegas, stays in Vegas right ? With a variety of cons ahead (BlackHat, Defcon, B-Sides, …) there is plenty of things that can and will happen at Vegas. Will you be there to witness & enjoy it ? Getting to Vegas is just one part of the story. Getting access to one of the cons is the second part, but in case of B-Sides, there are no tickets left anymore. So, in case you were not able to get one of the free tickets to B-Sides LV, there's good news ! We have 2 tickets for B-Sides LV (august 3 & 4, 2011)… and we're giving them away...but not without a little 'battle'...
Read more
Read More
Universal DEP/ASLR bypass with msvcr71.dll and mona.py
Over the last few weeks, there has been some commotion about a universal DEP/ASLR bypass routine using ROP gadgets from msvcr71.dll (written by Immunity Inc) and the fact that it might have been copied into an exploit submitted to Metasploit as part of the Metasploit bounty. I'm not going to make any statements about this, but the ROP routine itself looks pretty slick.
Read more
Read More
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
Statistics
The technical storage or access that is used exclusively for statistical purposes.
The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options
Manage services
Manage {vendor_count} vendors
Read more about these purposes
Accept
Deny
View preferences
Save preferences
View preferences
{title}
{title}
{title}
Manage consent