After hearing a lot of great things about the first edition of BruCON (in 2009), I decided to attend the con this year. The fact that BruCON is gaining popularity and established a lot of recognition in the industry Read more
This page hosts an unofficial list of applications that are said to be vulnerable to the dll hijacking flaw (or feature or whatever you want to call it). Note that I did not test these applications myself.
If you Read more
In article 8 of my exploit writing series, I have introduced the concept of egg hunters, and explained what an omelet hunter is and how it works.
Today, I want to share with you my own eggs-to-omelet implementation, explain Read more
WATOBO is intended to enable security professionals to perform highly efficient (semi-automated) web application security audits. I am convinced that the semi-automated approach is the best way to perform an accurate audit and to identify most of the vulnerabilities.
Read more
Last weekend, Offensive Security hosted their second cyber hacking challenge, called "HSIYF For Charity".
The goal of this challenge was to raise money for Johnny Long's "Hackers for Charity" project, a charity organization that tries to feed Read more
Hi,
Over the last 2 days my friends from Corelan Team and I participated in a Hacking Tournament, organized by Offensive Security.ย The primary goals of the tournament are :
Introduction: We continue our series of interviews with a slightly ยปunusualยซ talk this time:ย Peter Van Eeckhoutte may be unknown to readers who don't follow the InfoSec scene on a daily basis. But he is well known to Read more
Subscribe