Fuzzing with American Fuzzy Lop (AFL) 14 Jul 2015 In a previous entry we gave a brief introduction to the concept of fuzzing and why we use... Read more
Fuzzing with American Fuzzy Lop (AFL) 14 Jul 2015 In a previous entry we gave a brief introduction to the concept of fuzzing and why we use... Read more
VMware Multiple Products - Privilege Escalation 10 Jul 2015 This article summarises the findings and the impact of a vulnerability that we recently discovered in three major... Read more
Context Triggered Piecewise Hashing To Detect Malware Similarity 30 Jun 2015 At Nettitude we collect a large amount of malware binary samples, both from our Honeypot network, from our... Read more
The Prestige in Malware Persistence 16 Jun 2015 Just like in magic tricks, a malware infection very often consists of three parts or acts. Paraphrasing the... Read more
Malware Is Changing Daily! Are You Still Protected? 1 May 2015 One of the biggest challenges in detecting and protecting against malware is that attackers continually change their techniques... Read more
Loading A Weaponised Interactive PowerShell Session With Metasploit 27 Apr 2015 PowerShell is rapidly becoming the go to post exploitation method for hackers, with a plethora of awesome PowerShell... Read more
Version Tracking in Ghidra 16 Apr 2015 When a binary is reverse engineered using Ghidra, various annotations are applied to aid in understanding the binary’s... Read more
QNAP NAS – Remote Unauthenticated User To Admin Shell:... 8 Apr 2015 A number of security vulnerabilities have been identified in two applications hosted on the QNAP App Centre. When... Read more
Network Security Monitoring With Bro IDS, TCPDump And MongoDB 1 Apr 2015 Bro IDS is a powerful open source network security monitoring framework which I have had the opportunity to experiment... Read more
Best seller New Price from Limited availability Course type Course length Dates and location x *PLEASE NOTE: Course is available in more countries, languages and dates*