Loading A Weaponised Interactive PowerShell Session With Metasploit 27 Apr 2015 PowerShell is rapidly becoming the go to post exploitation method for hackers, with a plethora of awesome PowerShell... Read more
Version Tracking in Ghidra 16 Apr 2015 When a binary is reverse engineered using Ghidra, various annotations are applied to aid in understanding the binary’s... Read more
QNAP NAS – Remote Unauthenticated User To Admin Shell:... 8 Apr 2015 A number of security vulnerabilities have been identified in two applications hosted on the QNAP App Centre. When... Read more
Network Security Monitoring With Bro IDS, TCPDump And MongoDB 1 Apr 2015 Bro IDS is a powerful open source network security monitoring framework which I have had the opportunity to experiment... Read more
CSRF And Unsafe Arbitrary File Upload In NextGEN Gallery... 25 Mar 2015 Please note the vulnerability detailed in this blog article was first discovered on Monday 9th March 2015, disclosed and... Read more
Windows Inline Function Hooking 18 Mar 2015 Hooking can be used by legitimate software for reverse engineering, for example, to examine the user mode function... Read more
Vulnerability Discovery Via 'Fuzzing' 11 Mar 2015 Why would you fuzz? People fuzz for many reasons, depending on the industry they are in, from reliable... Read more
DLL Injection: Part Two 4 Mar 2015 In a previous blog post I gave a high level overview of DLL injection, what it is used... Read more
DLL Injection: Part One 25 Feb 2015 DLL injection is a technique that can be used by legitimate software to add functionality, aid with debugging,... Read more
A Beginners’ Guide to Obfuscation 11 Feb 2015 Obfuscation is a technique used to change software code in order to make it harder for a human... Read more
Best seller New Price from Limited availability Course type Course length Dates and location x *PLEASE NOTE: Course is available in more countries, languages and dates*