Table of Contents
Professional pentesters typically use a host that is connected directly to the internet, has a public IP address, and is not hindered by any firewalls or NAT devices to perform their audit. Hacking "naked" is considered to be the Read more
Good morning everyone,
Welcome to BlackHat Europe 2013 ! As announced in my post a couple of days ago, I’ll try to post short write-ups about some of the talks right after the presentation has finished. Read more
An Egghunter is nothing more than an assembly routine to find shellcode somewhere in memory. We typically deploy an Egghunter when there is no more room in our buffer that we can use to initially redirect EIP Read more