{"id":9848,"date":"2013-03-14T15:29:03","date_gmt":"2013-03-14T14:29:03","guid":{"rendered":"https:\/\/www.corelan.be\/?p=9848"},"modified":"2013-03-14T15:29:03","modified_gmt":"2013-03-14T14:29:03","slug":"blackhateu2013-day1-hardening-windows-8-apps-for-the-windows-store","status":"publish","type":"post","link":"https:\/\/www.corelan.be\/index.php\/2013\/03\/14\/blackhateu2013-day1-hardening-windows-8-apps-for-the-windows-store\/","title":{"rendered":"BlackHatEU2013 - Day1 - Hardening Windows 8 Apps for the Windows Store"},"content":{"rendered":"<p>The first talk after having lunch at BlackHat Europe 2013, title \"Hardening Windows 8 Apps for the Windows Store\" is delivered by <a href=\"http:\/\/www.blackhat.com\/eu-13\/briefings.html#Sempf\">Bill Sempf<\/a>\u00a0(<a href=\"https:\/\/www.twitter.com\/sempf\">@sempf<\/a>). Usually, the first slot after lunch is not really a gift to speakers as attendees tend to be busy digesting lunch at that time. \u00a0Perhaps the absence of slides during the presentation might help keeping people awake \ud83d\ude42<\/p>\n<p>Bill starts his presentation by interacting with the audience and asks who has played with Windows 8 and\/or has done development on Windows 8. \u00a0 He explains that the start screen is really cool if you have a touch enable device. \u00a0If you are using a regular laptop\/desktop, you'll probably going to skip this start screen and go back to Windows 7 mode. \u00a0Bill started writing apps for Windows 8 since the OS got released and is author of the \"Windows 8 application development for dummies\" book.<\/p>\n<p>There are 3 ways to build a Windows Store app. \u00a0You can build .Net applications, Windows ASP.Net, WPF applications etc in Windows 8, using C++ or C#. \u00a0Silverlight apps, however, are gone. \u00a0The Windows 8 start screen tiles are Windows 8 Apps, based on WinRT. \u00a0Although this is fundamentally different than Silverlight, it's quite easy to make the move to WinRT. \u00a0Keep in mind that there are significant limitations to what you can do from WinRT. \u00a0In fact, you don't have access to sockets. You can connect to port 80 and 443, but that's about it. \u00a0You can't connect to a SQL server, read email. \u00a0You don't even have access to the filesystem in a way this is possible in normal \"traditional\" applications. \u00a0On the other hand, the development environment comes with a large number of templates that help lowering the barrier to get started with WinRT development. \u00a0 In addition to C++ and C# to write WinRT apps (both using XAML), you can also use Javascript, which is now closely integrated with WinRT using the WinJS engine. \u00a0In fact, at least half of the applications in the Windows store today are written in JavaScript, Bill says.<\/p>\n<p>As the number of applications in the Windows Store increases, the use of Windows 8 will become a reality in the enterprise, which means we'l have to deal with it eventually.<\/p>\n<p>From a WinRT login perspective, all you need is a Microsoft account (similar to the iTunes account for Apple, or your GMail account for Android). The Windows RT environment has APIs that allow applications to access this login information from within an application.<\/p>\n<p>Bill explains that in WinRT, calls to a service shouldn't take longer than 15 seconds. If they do, you'll need to handle communication and actions asynchronously. \u00a0Unfortunately, the demo didn't work because of internet connectivity issues.<\/p>\n<p>\u201cCapabilities\" are subject to the Windows Store policy. They will cause popups and request the user to \"accept\" a message before a certain action can occur. If you are looking at app store applications, make sure to review the list with capabilities and their settings. \u00a0When developing an application, start with \"no capabilities\" and turn them on one by one, until the application works.<\/p>\n<p>\"Declarations\" are the opposing side of \"Capabilities\". Declarations allow you to define what type of access the application needs from the OS. \u00a0Even if apps don't know anything about each other, can still work together by setting them as a \"share\" target. If you enable your app to be a \"share\" target, you'd better provide the code to handle this properly, Bill explains. \u00a0The \"Evernote\" app is a good example on NOT how to do this.<\/p>\n<p>Applications need to be able to store \"stuff\" somewhere. \u00a0Apps may use \"cookies\" or \"config files\" that need to get updated at runtime. SInce WinRT doesn't really have access to the traditional filesystem, the apps need to use Windows.Storage.ApplicationData. One of the ways to store data is by using \u00a0\"roaming settings\" (which essentially tells Windows to save the data in the cloud, hosted at Microsoft\u2026 somewhere\u2026 we think). \u00a0Traffic seems to be encrypted, Bill continues, but this might still be a privacy issues, especially because you don't really know where the data is stored. In fact, by looking at the traffic, Bill noticed that some of the data gets actually stored at Google. \u00a0If you're using the \u201clocalStorage\" technique to store data, keep in mind that everything is stored in plain text xml. \u00a0If you want to make it safer, you'll have to use online \"services\" instead, so you can store\/retrieve data over http\/https. \u00a0Combine this with the fact that people expect to be mobile, this means you'll have to expose these services to the internet to make this work.<\/p>\n<p>From a Windows App testing perspective, Bill continues, this means you'll probably should focus on testing these service first, just like any other web application. You could use OWASP Zed Attack Proxy (ZAP), which is free, or Burp if you have a license. \u00a0The WinRT dev environments comes with anti XSS libraries enabled. Bill mentions that it might be possible to bypass this XSS protection library. In other words, think of the App to be a web app that interacts with a service. \u00a0This means tests for SQL Injection \/ JSON injection\u2026 \u00a0Also, do a code review. Do not set \u00a0.innerHTML but use .innerText instead to avoid XSS issues inside your app.<\/p>\n<p>WinRT comes with support for hashing\/encryption, through crypto.CryptographicBuffer.<\/p>\n<p>In addition to using the Windows account to log on to WinRT, you can also take advantage of OAuth functionality. \u00a0OAuth will take over the entire authentication portion of the application. All you need to do is call OAuth (Windows.Security.Authentication.Web.WebAuthentication) and WinRT will take care of everything for you.<\/p>\n<p>Applications will just die on unhanded exceptions, without giving away stack trace information.<\/p>\n<p>Finally, code defensively. It's trivial to get the source code of \u00a0your apps because they are stored locally (c:\\Windows\\WindowsApps) and not obfuscated by default. \u00a0With WinJS code, you don't even need to use a decompiler, because the code is stored in a .js file. Don't store secrets or hardcode keys in your code.<\/p>\n<h3>Summary:<\/h3>\n<ul>\n<li>Choose your storage carefully<\/li>\n<li>Test the service layers<\/li>\n<li>Apply least privilege (Capabilities \/ Declarations). \u00a0Don't click all the things \ud83d\ude42<\/li>\n<li>Code defensively<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The first talk after having lunch at BlackHat Europe 2013, title \"Hardening Windows 8 Apps for the Windows Store\" is delivered by Bill Sempf\u00a0(@sempf). Usually, the first slot after lunch is not really a gift to speakers as attendees tend to be busy digesting lunch at that time. \u00a0Perhaps the absence of slides during the &hellip; <a href=\"https:\/\/www.corelan.be\/index.php\/2013\/03\/14\/blackhateu2013-day1-hardening-windows-8-apps-for-the-windows-store\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> \"BlackHatEU2013 - Day1 - Hardening Windows 8 Apps for the Windows Store\"<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[2250],"tags":[2681,316,261],"class_list":["post-9848","post","type-post","status-publish","format-standard","hentry","category-cons-seminars","tag-blackhat","tag-windows","tag-corelan"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>BlackHatEU2013 - Day1 - Hardening Windows 8 Apps for the Windows Store - Corelan | Exploit Development &amp; Vulnerability Research<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.corelan.be\/index.php\/2013\/03\/14\/blackhateu2013-day1-hardening-windows-8-apps-for-the-windows-store\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"BlackHatEU2013 - Day1 - Hardening Windows 8 Apps for the Windows Store - Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"og:description\" content=\"The first talk after having lunch at BlackHat Europe 2013, title &quot;Hardening Windows 8 Apps for the Windows Store&quot; is delivered by Bill Sempf\u00a0(@sempf). Usually, the first slot after lunch is not really a gift to speakers as attendees tend to be busy digesting lunch at that time. \u00a0Perhaps the absence of slides during the &hellip; Continue reading &quot;BlackHatEU2013 - Day1 - Hardening Windows 8 Apps for the Windows Store&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.corelan.be\/index.php\/2013\/03\/14\/blackhateu2013-day1-hardening-windows-8-apps-for-the-windows-store\/\" \/>\n<meta property=\"og:site_name\" content=\"Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corelanconsulting\" \/>\n<meta property=\"article:published_time\" content=\"2013-03-14T14:29:03+00:00\" \/>\n<meta name=\"author\" content=\"corelanc0d3r\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@corelanc0d3r\" \/>\n<meta name=\"twitter:site\" content=\"@corelanc0d3r\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2013\\\/03\\\/14\\\/blackhateu2013-day1-hardening-windows-8-apps-for-the-windows-store\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2013\\\/03\\\/14\\\/blackhateu2013-day1-hardening-windows-8-apps-for-the-windows-store\\\/\"},\"author\":{\"name\":\"corelanc0d3r\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/3be5542b9b0a0787893db83a5ad68e8f\"},\"headline\":\"BlackHatEU2013 - Day1 - Hardening Windows 8 Apps for the Windows Store\",\"datePublished\":\"2013-03-14T14:29:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2013\\\/03\\\/14\\\/blackhateu2013-day1-hardening-windows-8-apps-for-the-windows-store\\\/\"},\"wordCount\":1043,\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"keywords\":[\"blackhat\",\"windows\",\"corelan\"],\"articleSection\":[\"Cons and Seminars\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2013\\\/03\\\/14\\\/blackhateu2013-day1-hardening-windows-8-apps-for-the-windows-store\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2013\\\/03\\\/14\\\/blackhateu2013-day1-hardening-windows-8-apps-for-the-windows-store\\\/\",\"name\":\"BlackHatEU2013 - Day1 - Hardening Windows 8 Apps for the Windows Store - Corelan | Exploit Development &amp; Vulnerability Research\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\"},\"datePublished\":\"2013-03-14T14:29:03+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2013\\\/03\\\/14\\\/blackhateu2013-day1-hardening-windows-8-apps-for-the-windows-store\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2013\\\/03\\\/14\\\/blackhateu2013-day1-hardening-windows-8-apps-for-the-windows-store\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2013\\\/03\\\/14\\\/blackhateu2013-day1-hardening-windows-8-apps-for-the-windows-store\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.corelan.be\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"BlackHatEU2013 &#8211; Day1 &#8211; Hardening Windows 8 Apps for the Windows Store\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"name\":\"Corelan CyberSecurity Research\",\"description\":\"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.corelan.be\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\",\"name\":\"Corelan CyberSecurity Research\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"contentUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"width\":200,\"height\":200,\"caption\":\"Corelan CyberSecurity Research\"},\"image\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corelanconsulting\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\",\"https:\\\/\\\/x.com\\\/corelanconsulting\",\"https:\\\/\\\/instagram.com\\\/corelanconsult\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/3be5542b9b0a0787893db83a5ad68e8f\",\"name\":\"corelanc0d3r\",\"pronouns\":\"he\\\/him\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"caption\":\"corelanc0d3r\"},\"description\":\"Peter Van Eeckhoutte is the founder of Corelan and a globally recognized expert in exploit development and vulnerability research. With over two decades in IT security, he built Corelan into a respected platform for deep technical research, hands-on training, and knowledge sharing. Known for his influential exploit development tutorials, tools, and real-world training, Peter combines a strong research mindset with a passion for education\u2014helping security professionals understand not just how exploits work, but why.\",\"sameAs\":[\"https:\\\/\\\/www.corelan-training.com\",\"https:\\\/\\\/instagram.com\\\/corelanc0d3r\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/petervaneeckhoutte\\\/\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\"],\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/author\\\/admin0\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"BlackHatEU2013 - Day1 - Hardening Windows 8 Apps for the Windows Store - Corelan | Exploit Development &amp; Vulnerability Research","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.corelan.be\/index.php\/2013\/03\/14\/blackhateu2013-day1-hardening-windows-8-apps-for-the-windows-store\/","og_locale":"en_US","og_type":"article","og_title":"BlackHatEU2013 - Day1 - Hardening Windows 8 Apps for the Windows Store - Corelan | Exploit Development &amp; Vulnerability Research","og_description":"The first talk after having lunch at BlackHat Europe 2013, title \"Hardening Windows 8 Apps for the Windows Store\" is delivered by Bill Sempf\u00a0(@sempf). Usually, the first slot after lunch is not really a gift to speakers as attendees tend to be busy digesting lunch at that time. \u00a0Perhaps the absence of slides during the &hellip; Continue reading \"BlackHatEU2013 - Day1 - Hardening Windows 8 Apps for the Windows Store\"","og_url":"https:\/\/www.corelan.be\/index.php\/2013\/03\/14\/blackhateu2013-day1-hardening-windows-8-apps-for-the-windows-store\/","og_site_name":"Corelan | Exploit Development &amp; Vulnerability Research","article_publisher":"https:\/\/www.facebook.com\/corelanconsulting","article_published_time":"2013-03-14T14:29:03+00:00","author":"corelanc0d3r","twitter_card":"summary_large_image","twitter_creator":"@corelanc0d3r","twitter_site":"@corelanc0d3r","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/www.corelan.be\/index.php\/2013\/03\/14\/blackhateu2013-day1-hardening-windows-8-apps-for-the-windows-store\/#article","isPartOf":{"@id":"https:\/\/www.corelan.be\/index.php\/2013\/03\/14\/blackhateu2013-day1-hardening-windows-8-apps-for-the-windows-store\/"},"author":{"name":"corelanc0d3r","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/3be5542b9b0a0787893db83a5ad68e8f"},"headline":"BlackHatEU2013 - Day1 - Hardening Windows 8 Apps for the Windows Store","datePublished":"2013-03-14T14:29:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.corelan.be\/index.php\/2013\/03\/14\/blackhateu2013-day1-hardening-windows-8-apps-for-the-windows-store\/"},"wordCount":1043,"publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"keywords":["blackhat","windows","corelan"],"articleSection":["Cons and Seminars"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.corelan.be\/index.php\/2013\/03\/14\/blackhateu2013-day1-hardening-windows-8-apps-for-the-windows-store\/","url":"https:\/\/www.corelan.be\/index.php\/2013\/03\/14\/blackhateu2013-day1-hardening-windows-8-apps-for-the-windows-store\/","name":"BlackHatEU2013 - Day1 - Hardening Windows 8 Apps for the Windows Store - Corelan | Exploit Development &amp; Vulnerability Research","isPartOf":{"@id":"https:\/\/www.corelan.be\/#website"},"datePublished":"2013-03-14T14:29:03+00:00","breadcrumb":{"@id":"https:\/\/www.corelan.be\/index.php\/2013\/03\/14\/blackhateu2013-day1-hardening-windows-8-apps-for-the-windows-store\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.corelan.be\/index.php\/2013\/03\/14\/blackhateu2013-day1-hardening-windows-8-apps-for-the-windows-store\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.corelan.be\/index.php\/2013\/03\/14\/blackhateu2013-day1-hardening-windows-8-apps-for-the-windows-store\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.corelan.be\/"},{"@type":"ListItem","position":2,"name":"BlackHatEU2013 &#8211; Day1 &#8211; Hardening Windows 8 Apps for the Windows Store"}]},{"@type":"WebSite","@id":"https:\/\/www.corelan.be\/#website","url":"https:\/\/www.corelan.be\/","name":"Corelan CyberSecurity Research","description":"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.","publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.corelan.be\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.corelan.be\/#organization","name":"Corelan CyberSecurity Research","url":"https:\/\/www.corelan.be\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/","url":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","contentUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","width":200,"height":200,"caption":"Corelan CyberSecurity Research"},"image":{"@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corelanconsulting","https:\/\/x.com\/corelanc0d3r","https:\/\/x.com\/corelanconsulting","https:\/\/instagram.com\/corelanconsult"]},{"@type":"Person","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/3be5542b9b0a0787893db83a5ad68e8f","name":"corelanc0d3r","pronouns":"he\/him","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","url":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","caption":"corelanc0d3r"},"description":"Peter Van Eeckhoutte is the founder of Corelan and a globally recognized expert in exploit development and vulnerability research. With over two decades in IT security, he built Corelan into a respected platform for deep technical research, hands-on training, and knowledge sharing. Known for his influential exploit development tutorials, tools, and real-world training, Peter combines a strong research mindset with a passion for education\u2014helping security professionals understand not just how exploits work, but why.","sameAs":["https:\/\/www.corelan-training.com","https:\/\/instagram.com\/corelanc0d3r","https:\/\/www.linkedin.com\/in\/petervaneeckhoutte\/","https:\/\/x.com\/corelanc0d3r"],"url":"https:\/\/www.corelan.be\/index.php\/author\/admin0\/"}]}},"views":2529,"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/9848","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/comments?post=9848"}],"version-history":[{"count":0,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/9848\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/media?parent=9848"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/categories?post=9848"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/tags?post=9848"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}