Some of you may have already noticed … Corelan team decided to open an official channel on IRC (freenode). About 24 hours ago, the channel went live and we have had the pleasure to greeting about 50 users Read more
I started the second day at BruCON with attending the workshop about analyzing malicious pdf files.
Didier Stevens spared no expense and prepared an impressive lab, offering all sorts of pdf exercise files. Read more
After hearing a lot of great things about the first edition of BruCON (in 2009), I decided to attend the con this year. The fact that BruCON is gaining popularity and established a lot of recognition in the industry Read more
This page hosts an unofficial list of applications that are said to be vulnerable to the dll hijacking flaw (or feature or whatever you want to call it). Note that I did not test these applications myself.
If you Read more
In article 8 of my exploit writing series, I have introduced the concept of egg hunters, and explained what an omelet hunter is and how it works.
Today, I want to share with you my own eggs-to-omelet implementation, explain Read more
WATOBO is intended to enable security professionals to perform highly efficient (semi-automated) web application security audits. I am convinced that the semi-automated approach is the best way to perform an accurate audit and to identify most of the vulnerabilities.
Read more
Last weekend, Offensive Security hosted their second cyber hacking challenge, called "HSIYF For Charity".
The goal of this challenge was to raise money for Johnny Long’s "Hackers for Charity" project, a charity organization that tries to feed Read more