{"id":9869,"date":"2013-03-15T12:18:32","date_gmt":"2013-03-15T11:18:32","guid":{"rendered":"https:\/\/www.corelan.be\/?p=9869"},"modified":"2013-03-15T12:18:32","modified_gmt":"2013-03-15T11:18:32","slug":"blackhateu2013-day2-whos-really-attacking-your-ics-devices","status":"publish","type":"post","link":"https:\/\/www.corelan.be\/index.php\/2013\/03\/15\/blackhateu2013-day2-whos-really-attacking-your-ics-devices\/","title":{"rendered":"BlackHatEU2013 - Day2 - Who's really attacking your ICS devices ?"},"content":{"rendered":"<p><a href=\"http:\/\/www.blackhat.com\/eu-13\/briefings.html#Wilhoit\">Kyle Wilhoit<\/a>, Threat researcher at Trend Micro, explains that he will provide an overview of ICS systems before looking at some interesting attacks at ICS systems.<\/p>\n<h3>Concerns\/Overview of ICS Security and\u00a0Typical deployments<\/h3>\n<p>ICS devices are used in production of virtually anything. They are used in water\/gas\/energy\/automobile\/manufacturing, etc. \u00a0They are notoriously insecure in many ways. \u00a0Software is sometimes embedded, sometimes not. ICS devices are typically proprietary, specific to the vendor.<\/p>\n<p>A typical ICS deployment contains a supervisory network (SCADA network) and one or multiple control systems. \u00a0The supervisory network communicates with the control systems. \u00a0Traditional deployments usually don't contain any security layers.<\/p>\n<h3>Overview of 2 SCADA protocols<\/h3>\n<p>DNP3 is a complex protocol, used to send and receive messages. \u00a0There is no authentication or encryption and have several published vulnerabilities.<\/p>\n<p>Modbus is the oldest ICS protocol, which mostly controls I\/O interfaces. No authentication or encryption, no broadcast suppression and has multiple vulnerabilities.<\/p>\n<p>Typically, priorities for ICS are productively, up-time and reliability of data. \u00a0IT is concerned about protecting the data, communications and limiting the number of interruptions.<\/p>\n<p>In 2012, 171 unique vulnerabilities affecting ICS products were reported, affecting 55 vendors. \u00a026% of these devices revolve around internet-facing devices.<\/p>\n<h3>Scada on the internet<\/h3>\n<p>It has proven to be trivial to find ICS systems using Shodan. Example searches include \"VxWorks\" and \"Meter Information\". \u00a0Of course, this only gets you the systems that are internet facing, not just the ones that are vulnerable. \u00a0You can find other systems by querying paste bin, ERIPP and Twitter. \u00a0In short, there a multiple ways to find Scada systems exposed to the entire world.<\/p>\n<h3>Story time<\/h3>\n<p>\"Small town in rural America, has a water pump controlling system, which is internet facing. \u00a0During Q3\/Q4 of 2012, it has been attacked multiple times.\" \u00a0 Kyle introduces the fact that he has set up an ICS honeypot in his basement that looks like a water pump controlling system to gather information about real attacks.<\/p>\n<p>His honeypot consists of 2 low interaction systems and one high-interaction system (using real devices), deployed on a Windows 2008 server and 2 Ubuntu servers. \u00a0It ran for 28 days in total. \u00a0On the internet facing UI, he included very clear messages that a system compromise might adversly affect water containment.<\/p>\n<p>The external IP of the honeypot exposes a \"Control System\", which uses a PLC in the back-end, simulating a water pump system. \u00a0The high-interaction honeypot consists of a couple of machines (combination of physical systems and Amazon EC2 instances), simulating a control system, a Nano-10 PLC, a Siemens Simatic S7-1200 system, and a separate workstation that contained \"salted\" docs. \u00a0He also used Honeywall and generated real DNP3 and Modbus traffic on the network.<\/p>\n<p>To make things look real, he registered a domain name that references the name of the city where he set up the honeypot, to make it look like this is the city water containment system.<\/p>\n<p>To make the system vulnerable, he used a set of vulnerabilities:<\/p>\n<ul>\n<li>SNMP vulnerabilities, allowing read\/write<\/li>\n<li>Authentication limitations (admin\/admin username &amp; password, default username&amp;password configs for control devices, etc)<\/li>\n<li>Limits of Modbus\/DNP3 authentication\/encryption<\/li>\n<li>VxWords vulnerability (FTP)<\/li>\n<li>Open access for certain ICS modifications (fan speed, temperature and utilization)<\/li>\n<\/ul>\n<p>During his test, he decided to only track of<\/p>\n<ul>\n<li>Real targeted attacks<\/li>\n<li>Modifications of the pump system (FTP\/Telnet\/...)<\/li>\n<li>Attempted modifications via Modbus\/DNP3<\/li>\n<li>DoS\/DDoS<\/li>\n<\/ul>\n<h3>Attacks<\/h3>\n<p>Based on the gathered statistics, he discover that<\/p>\n<p>17 attacks originated from China, 9 came from the\u00a0US, 6 from Laos, 4 from the UK, and some individual attacks from a variety of countries (North Korea, Chile, Palestine, Vietnam, Poland, Brazil, Japan, the Netherlands).<\/p>\n<p>Attacks included:<\/p>\n<ul>\n<li>2 VxWorks exploitation attempts<\/li>\n<li>12 Attempts to shut down the system<\/li>\n<li>7 attempts to modify the temperate output<\/li>\n<li>5 attempts to modify the pump pressure<\/li>\n<li>9 attempts to access a secured area<\/li>\n<li>2 attempts to modify traffic<\/li>\n<li>6 attempts to modify the CPU fan speed.<\/li>\n<\/ul>\n<p>He was able to detect some of these attacks using Digital Bond's Quickdraw Scada Snort rules and created some custom snort rules as well. \u00a0One of the interesting facts was that he didn't see any DNP3 traffic based attacks, probably because of the complexity of the protocol.<\/p>\n<p>Kyle continues by explaining that he also set up a mailbox using the same 'fake' domain name and noticed that one of the attacker actually sent a spear phishing email to the mailbox, which contained the name the real city administrator for the system. In other words, the attacker did some recon, figured out who the real admin was and used the email address found on the honeypot website to attack that person. \u00a0The email contained a kind request for the person to fill out a survey and included a CityRequest.docx file. Of course, this document contains an exploit that infects the machine with malware.<\/p>\n<p>Kyle analysed the malware and noticed that it exploits CVE-2012-0158 and connects to a C&amp;C server in China. \u00a0After 5 days, files started leaving the infected machined.\u00a0Further analysis shows that the malware monitors reg keys for value changes, creates guard pages, dropped PE files, communicates with C2 IP's, creates files, creates fake documents and opens it.<\/p>\n<h3>Attacker profile<\/h3>\n<p>Who's attacking the ICS system? \u00a0One of the C2 serves was wide open, so Kyle hopped onto the server and could see the documents that were pulled from his own ICS server. \u00a0The malware used seemed to be co-reused and the attacks seemed to be targeted, but it's unclear what the motivation was for the attack. \u00a0There was some reconnaissance activity on the infected system, attempts were made to damage the system, data was stolen, and a persistent backdoor was placed.<\/p>\n<h3>Recommendations<\/h3>\n<ul>\n<li>Disable internet access to your trusted resources, where possible<\/li>\n<li>Maintain your trusted resources at the latest patch levels and ensure you are diligent in monitoring when new patches\/fixes are released<\/li>\n<li>Require username\/password (two-factor if possible) combinations for all systems, including those are not deemed \"trusted\"<\/li>\n<li>Control contractor-access. Many SCADA\/ICS networks utilise remote contractors and controlling how they access trusted resources in imperative.<\/li>\n<li>Use SSL\/TLS for communications to web-based ICS\/SCADA systems<\/li>\n<li>Control access to trusted devices. Use a bastion host with ACLs for ingres\/egress access. Segment your network<\/li>\n<li>Improve logging on trusted environments, in addition to passing logs to SIEM devices for third party backup\/analysis<\/li>\n<li>Utilize zones such as \"BLAN\", \"WLAN\" and SCADA<\/li>\n<li>Develop a threat modelling system to your organisation, understand who's attacking you and why.<\/li>\n<\/ul>\n<p>Remember:\u00a0These attacks are happening\u2026 today.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kyle Wilhoit, Threat researcher at Trend Micro, explains that he will provide an overview of ICS systems before looking at some interesting attacks at ICS systems. Concerns\/Overview of ICS Security and\u00a0Typical deployments ICS devices are used in production of virtually anything. They are used in water\/gas\/energy\/automobile\/manufacturing, etc. \u00a0They are notoriously insecure in many ways. \u00a0Software &hellip; <a href=\"https:\/\/www.corelan.be\/index.php\/2013\/03\/15\/blackhateu2013-day2-whos-really-attacking-your-ics-devices\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> \"BlackHatEU2013 - Day2 - Who's really attacking your ICS devices ?\"<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[2250],"tags":[3213,2681,261,133],"class_list":["post-9869","post","type-post","status-publish","format-standard","hentry","category-cons-seminars","tag-ics-devices","tag-blackhat","tag-corelan","tag-snort"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>BlackHatEU2013 - Day2 - Who&#039;s really attacking your ICS devices ? - Corelan | Exploit Development &amp; Vulnerability Research<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.corelan.be\/index.php\/2013\/03\/15\/blackhateu2013-day2-whos-really-attacking-your-ics-devices\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"BlackHatEU2013 - Day2 - Who&#039;s really attacking your ICS devices ? - Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"og:description\" content=\"Kyle Wilhoit, Threat researcher at Trend Micro, explains that he will provide an overview of ICS systems before looking at some interesting attacks at ICS systems. Concerns\/Overview of ICS Security and\u00a0Typical deployments ICS devices are used in production of virtually anything. They are used in water\/gas\/energy\/automobile\/manufacturing, etc. \u00a0They are notoriously insecure in many ways. \u00a0Software &hellip; Continue reading &quot;BlackHatEU2013 - Day2 - Who&#039;s really attacking your ICS devices ?&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.corelan.be\/index.php\/2013\/03\/15\/blackhateu2013-day2-whos-really-attacking-your-ics-devices\/\" \/>\n<meta property=\"og:site_name\" content=\"Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corelanconsulting\" \/>\n<meta property=\"article:published_time\" content=\"2013-03-15T11:18:32+00:00\" \/>\n<meta name=\"author\" content=\"corelanc0d3r\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@corelanc0d3r\" \/>\n<meta name=\"twitter:site\" content=\"@corelanc0d3r\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2013\\\/03\\\/15\\\/blackhateu2013-day2-whos-really-attacking-your-ics-devices\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2013\\\/03\\\/15\\\/blackhateu2013-day2-whos-really-attacking-your-ics-devices\\\/\"},\"author\":{\"name\":\"corelanc0d3r\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/3be5542b9b0a0787893db83a5ad68e8f\"},\"headline\":\"BlackHatEU2013 - Day2 - Who's really attacking your ICS devices ?\",\"datePublished\":\"2013-03-15T11:18:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2013\\\/03\\\/15\\\/blackhateu2013-day2-whos-really-attacking-your-ics-devices\\\/\"},\"wordCount\":1085,\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"keywords\":[\"ICS devices\",\"blackhat\",\"corelan\",\"snort\"],\"articleSection\":[\"Cons and Seminars\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2013\\\/03\\\/15\\\/blackhateu2013-day2-whos-really-attacking-your-ics-devices\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2013\\\/03\\\/15\\\/blackhateu2013-day2-whos-really-attacking-your-ics-devices\\\/\",\"name\":\"BlackHatEU2013 - Day2 - Who's really attacking your ICS devices ? - Corelan | Exploit Development &amp; Vulnerability Research\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\"},\"datePublished\":\"2013-03-15T11:18:32+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2013\\\/03\\\/15\\\/blackhateu2013-day2-whos-really-attacking-your-ics-devices\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2013\\\/03\\\/15\\\/blackhateu2013-day2-whos-really-attacking-your-ics-devices\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2013\\\/03\\\/15\\\/blackhateu2013-day2-whos-really-attacking-your-ics-devices\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.corelan.be\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"BlackHatEU2013 &#8211; Day2 &#8211; Who&#8217;s really attacking your ICS devices ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"name\":\"Corelan CyberSecurity Research\",\"description\":\"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.corelan.be\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\",\"name\":\"Corelan CyberSecurity Research\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"contentUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"width\":200,\"height\":200,\"caption\":\"Corelan CyberSecurity Research\"},\"image\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corelanconsulting\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\",\"https:\\\/\\\/x.com\\\/corelanconsulting\",\"https:\\\/\\\/instagram.com\\\/corelanconsult\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/3be5542b9b0a0787893db83a5ad68e8f\",\"name\":\"corelanc0d3r\",\"pronouns\":\"he\\\/him\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"caption\":\"corelanc0d3r\"},\"description\":\"Peter Van Eeckhoutte is the founder of Corelan and a globally recognized expert in exploit development and vulnerability research. With over two decades in IT security, he built Corelan into a respected platform for deep technical research, hands-on training, and knowledge sharing. Known for his influential exploit development tutorials, tools, and real-world training, Peter combines a strong research mindset with a passion for education\u2014helping security professionals understand not just how exploits work, but why.\",\"sameAs\":[\"https:\\\/\\\/www.corelan-training.com\",\"https:\\\/\\\/instagram.com\\\/corelanc0d3r\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/petervaneeckhoutte\\\/\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\"],\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/author\\\/admin0\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"BlackHatEU2013 - Day2 - Who's really attacking your ICS devices ? - Corelan | Exploit Development &amp; Vulnerability Research","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.corelan.be\/index.php\/2013\/03\/15\/blackhateu2013-day2-whos-really-attacking-your-ics-devices\/","og_locale":"en_US","og_type":"article","og_title":"BlackHatEU2013 - Day2 - Who's really attacking your ICS devices ? - Corelan | Exploit Development &amp; Vulnerability Research","og_description":"Kyle Wilhoit, Threat researcher at Trend Micro, explains that he will provide an overview of ICS systems before looking at some interesting attacks at ICS systems. Concerns\/Overview of ICS Security and\u00a0Typical deployments ICS devices are used in production of virtually anything. They are used in water\/gas\/energy\/automobile\/manufacturing, etc. \u00a0They are notoriously insecure in many ways. \u00a0Software &hellip; Continue reading \"BlackHatEU2013 - Day2 - Who's really attacking your ICS devices ?\"","og_url":"https:\/\/www.corelan.be\/index.php\/2013\/03\/15\/blackhateu2013-day2-whos-really-attacking-your-ics-devices\/","og_site_name":"Corelan | Exploit Development &amp; Vulnerability Research","article_publisher":"https:\/\/www.facebook.com\/corelanconsulting","article_published_time":"2013-03-15T11:18:32+00:00","author":"corelanc0d3r","twitter_card":"summary_large_image","twitter_creator":"@corelanc0d3r","twitter_site":"@corelanc0d3r","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/www.corelan.be\/index.php\/2013\/03\/15\/blackhateu2013-day2-whos-really-attacking-your-ics-devices\/#article","isPartOf":{"@id":"https:\/\/www.corelan.be\/index.php\/2013\/03\/15\/blackhateu2013-day2-whos-really-attacking-your-ics-devices\/"},"author":{"name":"corelanc0d3r","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/3be5542b9b0a0787893db83a5ad68e8f"},"headline":"BlackHatEU2013 - Day2 - Who's really attacking your ICS devices ?","datePublished":"2013-03-15T11:18:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.corelan.be\/index.php\/2013\/03\/15\/blackhateu2013-day2-whos-really-attacking-your-ics-devices\/"},"wordCount":1085,"publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"keywords":["ICS devices","blackhat","corelan","snort"],"articleSection":["Cons and Seminars"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.corelan.be\/index.php\/2013\/03\/15\/blackhateu2013-day2-whos-really-attacking-your-ics-devices\/","url":"https:\/\/www.corelan.be\/index.php\/2013\/03\/15\/blackhateu2013-day2-whos-really-attacking-your-ics-devices\/","name":"BlackHatEU2013 - Day2 - Who's really attacking your ICS devices ? - Corelan | Exploit Development &amp; Vulnerability Research","isPartOf":{"@id":"https:\/\/www.corelan.be\/#website"},"datePublished":"2013-03-15T11:18:32+00:00","breadcrumb":{"@id":"https:\/\/www.corelan.be\/index.php\/2013\/03\/15\/blackhateu2013-day2-whos-really-attacking-your-ics-devices\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.corelan.be\/index.php\/2013\/03\/15\/blackhateu2013-day2-whos-really-attacking-your-ics-devices\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.corelan.be\/index.php\/2013\/03\/15\/blackhateu2013-day2-whos-really-attacking-your-ics-devices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.corelan.be\/"},{"@type":"ListItem","position":2,"name":"BlackHatEU2013 &#8211; Day2 &#8211; Who&#8217;s really attacking your ICS devices ?"}]},{"@type":"WebSite","@id":"https:\/\/www.corelan.be\/#website","url":"https:\/\/www.corelan.be\/","name":"Corelan CyberSecurity Research","description":"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.","publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.corelan.be\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.corelan.be\/#organization","name":"Corelan CyberSecurity Research","url":"https:\/\/www.corelan.be\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/","url":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","contentUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","width":200,"height":200,"caption":"Corelan CyberSecurity Research"},"image":{"@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corelanconsulting","https:\/\/x.com\/corelanc0d3r","https:\/\/x.com\/corelanconsulting","https:\/\/instagram.com\/corelanconsult"]},{"@type":"Person","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/3be5542b9b0a0787893db83a5ad68e8f","name":"corelanc0d3r","pronouns":"he\/him","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","url":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","caption":"corelanc0d3r"},"description":"Peter Van Eeckhoutte is the founder of Corelan and a globally recognized expert in exploit development and vulnerability research. With over two decades in IT security, he built Corelan into a respected platform for deep technical research, hands-on training, and knowledge sharing. Known for his influential exploit development tutorials, tools, and real-world training, Peter combines a strong research mindset with a passion for education\u2014helping security professionals understand not just how exploits work, but why.","sameAs":["https:\/\/www.corelan-training.com","https:\/\/instagram.com\/corelanc0d3r","https:\/\/www.linkedin.com\/in\/petervaneeckhoutte\/","https:\/\/x.com\/corelanc0d3r"],"url":"https:\/\/www.corelan.be\/index.php\/author\/admin0\/"}]}},"views":3541,"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/9869","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/comments?post=9869"}],"version-history":[{"count":0,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/9869\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/media?parent=9869"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/categories?post=9869"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/tags?post=9869"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}