Home
Articles
📝 Corelan content by topic
🔖 Tag cloud
Community
👥 Discord
🛠️ Tools
Support Us
Buy Merchandise
Donate
Training
About
About me
About Corelan Team
Contact me
Terms of Use
Home
Articles
📝 Corelan content by topic
🔖 Tag cloud
Community
👥 Discord
🛠️ Tools
Support Us
Buy Merchandise
Donate
Training
About
About me
About Corelan Team
Contact me
Terms of Use
Posts: (234)
All
Active Directory
AI
Certificates
Cisco
Cons and Seminars
Corelan Free Tools
Crypto
CSO
Debugging
Development
Exploit Writing Tutorials
Exploit Writing Videos
Exploits
Fuzzing
Interview
Juniper
Legal
Linux and Unix
Malware and Reversing
Metasploit
mona
MS Exchange
Networking
OpsMgr
Outlook
Papers
Penetration testing
Pentesting
Powershell
Private
Root Cause Analysis
Scripts
Security
Sharepoint
SQL Injection
Storage
Tools
Uncategorized
Video
Virtualization
Web Application Security
Windows Client OS
Windows Internals
Windows Server
Wordpress
Name, A to Z
Name, Z to A
Date, old to new
Date, new to old
HITB 2011 CTF - Reversing Vectored Exception Handling (VEH)
Today we will have a look at a CTF binary from HITB pre qualifications CTF 2011. This is an interesting binary to reverse because Vectored Exception Handling (VEH) was used in the challenge...
Read more
Read More
Honeynet Workshop 2011
March 21th I was in Paris for the annual Honeynet Workshop. For the first time this year there was a conference day accessible to the general public. Moreover, I didn't have to pay the registration fee since I successfully completed one of the Honeynet Forensics challenges. The day was split in 4 sessions and had talks covering the Honeynet projects, malware, and ethical and legal considerations of tracking botnets and eventual take-downs.
Read more
Read More
Pastenum - Pastebin/pastie enumeration tool
When conducting a pen-test, the process typically starts with the reconnaissance phase, the process of gathering information about your target(s) system, organization or person. Today, we want to present a tool that can be added to your reconnaissance toolkit.
Read more
Read More
BlackHat Europe 2011 / Day 02
Having missed the IOActive party last night, I woke up fresh and sharp and ready for some kick-ass debugger stuff so I decided to start my second day at BlackHat Europe 2011 with attending the Cisco IOS fuzzing & debugging talk.
Read more
Read More
BlackHat Europe 2011 / Day 01
After having breakfast, chatting with ping and hanging out with @kokanin, @xme and @wimremes, it was time to start attending the various talks. So, as promised in yesterdays preview, what follows is the report of my first day at Black Hat Europe 2011.
Read more
Read More
BlackHat Europe 2011 / Preview
Things change. 11 months have passed since a lot of people found themselves trapped all over Europe (including Barcelona) because of a little volcano ash cloud thingy. This is 2011. This time BlackHat anticipated and outsmarted nature by rescheduling the Europe briefings to march (instead of april).
Read more
Read More
Codegate 2011 CTF - Binary200 - Anti Debugging Techniques Explained
Aloha, Again I stumbled upon a nice reverse-me, binary200 from the Codegate 2011 CTF. And again there are some really interesting anti-debugging tricks implemented, so I decided to produce another video.
Read more
Read More
Cheat sheet : Installing Snorby 2.2 with Apache2 and Suricata with Barnyard2 on Ubuntu 10.x
After spending a few hours fighting a battle against Snorby and Apache2 + Passenger, I finally managed to get it to run properly on my Ubunty 10.x box (32bit). Looking back, I figured I might not be the only one who is having issues with this. So I decided to publish the notes I took while setting everything up, and as a little bonus, explain how to install and configure Suricata as well (configured in combination with barnyard2 which will pick up local logs and send them to the remote MySQL server).
Read more
Read More
Anti-debugging tricks revealed - Defcon CTF Qualifications 2009: Bin300 Analysis
A while ago I stumbled upon an awesome write-up of a very nice CTF challenge created by sapheads: http://hackerschool.org/DefconCTF/17/B300.html I love cartoons, and I love reversing, so I decided to play a little bit with that binary (b300.exe) which was a lot of fun. Because some interesting anti-debugging tricks were implemented into the binary...
Read more
Read More
The Honeypot Incident - How strong is your UF (Reversing FU)
Interested in capturing, documenting and analyzing scans and malicious activity, Corelan Team decided to set up a honeypot and put it online. In the first week of december 2010, Obzy built a machine (default Windows XP SP3 installation, no patches, firewall turned off), named it "EGYPTS-AIRWAYS", set up a honeypot + some other monitoring tools, and connected it to the internet.
Read more
Read More
〈
1
…
7
8
9
…
24
〉
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
Statistics
The technical storage or access that is used exclusively for statistical purposes.
The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options
Manage services
Manage {vendor_count} vendors
Read more about these purposes
Accept
Deny
View preferences
Save preferences
View preferences
{title}
{title}
{title}
Manage consent
Subscribe