Skip content

171 180 195 results

Filter by

  • Fuzzing with American Fuzzy Lop (AFL)

    In a previous entry we gave a brief introduction to the concept of fuzzing and why we use...

    Read more
    LRQA logo on navy background
  • Fuzzing with American Fuzzy Lop (AFL)

    In a previous entry we gave a brief introduction to the concept of fuzzing and why we use...

    Read more
  • VMware Multiple Products - Privilege Escalation

    This article summarises the findings and the impact of a vulnerability that we recently discovered in three major...

    Read more
  • Context Triggered Piecewise Hashing To Detect Malware Similarity

    At Nettitude we collect a large amount of malware binary samples, both from our Honeypot network, from our...

    Read more
  • The Prestige in Malware Persistence

    Just like in magic tricks, a malware infection very often consists of three parts or acts. Paraphrasing the...

    Read more
  • Malware Is Changing Daily! Are You Still Protected?

    One of the biggest challenges in detecting and protecting against malware is that attackers continually change their techniques...

    Read more
  • Loading A Weaponised Interactive PowerShell Session With Metasploit

    PowerShell is rapidly becoming the go to post exploitation method for hackers, with a plethora of awesome PowerShell...

    Read more
  • Version Tracking in Ghidra

    When a binary is reverse engineered using Ghidra, various annotations are applied to aid in understanding the binary’s...

    Read more
  • QNAP NAS – Remote Unauthenticated User To Admin Shell:...

    A number of security vulnerabilities have been identified in two applications hosted on the QNAP App Centre. When...

    Read more
  • Network Security Monitoring With Bro IDS, TCPDump And MongoDB

    Bro IDS is a powerful open source network security monitoring framework which I have had the opportunity to experiment...

    Read more

Error

Error

No results found

No results found that match your query

Loading results