Posts:

Corelan official IRC channel online (freenode)

#corelan

Some of you may have already noticed … Corelan team decided to open an official channel on IRC (freenode).  About 24 hours ago, the channel went live and we have had the pleasure to greeting about 50 users Read more

Read More

Death of an ftp client / Birth of Metasploit modules

Over the past few weeks, Corelan Team has given its undivided attention to fuzzing ftp client applications. Using a custom built ftp client fuzzer, now part of the Metasploit framework, the team has audited several ftp clients and applications that use an embedded client ftp component. One example of such an application is a tool that would synchronize / backup data from a computer to a remote ftp server. The 3 main audit/attack vectors that were used during the "project" were send back overly long responses to ftp commands / requests sent by the ftp client to the server send back a file/directory listing that contains overly long file/folder names try to download a file that has an overly long filename. Read more
Read More

BruCON 2010 : Day 0x2

[WORKSHOP] – Malicious PDF Analysis

I started the second day at BruCON with attending the workshop about analyzing malicious pdf files.

Didier Stevens spared no expense and prepared an impressive lab, offering all sorts of pdf exercise files.  Read more

Read More

BruCON 2010 : Day 0x1

After hearing a lot of great things about the first edition of BruCON (in 2009), I decided to attend the con this year.  The fact that BruCON is gaining popularity and established a lot of recognition in the industry Read more

Read More

DLL Hijacking (KB 2269637) – the unofficial list

This page hosts an unofficial list of applications that are said to be vulnerable to the dll hijacking flaw (or feature or whatever you want to call it). Note that I did not test these applications myself.

If you Read more

Read More

Exploit notes – win32 eggs-to-omelet

In article 8 of my exploit writing series, I have introduced the concept of egg hunters, and explained what an omelet hunter is and how it works.

Today, I want to share with you my own eggs-to-omelet implementation, explain Read more

Read More

Cisco VoIP Phones – A Hackers Perspective

Introduction

In the world of VoIP phones, each person may look at them differently. For some, an annoyance that sit on their desk, or maybe for some it is simply a part of their job either deploying them or Read more
Read More

WATOBO – the unofficial manual

WATOBO is intended to enable security professionals to perform highly efficient (semi-automated) web application security audits. I am convinced that the semi-automated approach is the best way to perform an accurate audit and to identify most of the vulnerabilities.

Read more

Read More

How strong is your fu 2 – the report

For anyone interested, this is _sinn3r's and tecr0c's writeup of the steps they took to own 4 out of the 5 machines in last weekend's HSIYF - Hacking for Charity cyber hacking challenge ... Read more
Read More

How strong is your fu : Hacking for charity

Last weekend, Offensive Security hosted their second cyber hacking challenge, called "HSIYF For Charity".

The goal of this challenge was to raise money for Johnny Long’s  "Hackers for Charity" project, a charity organization that tries to feed Read more

Read More