Skip content

Articles index

Searchable index of articles from our domain experts

501 510 524 results

  • Version Tracking in Ghidra

    When a binary is reverse engineered using Ghidra, various annotations are applied to aid in understanding the binary’s...

    Read more
  • QNAP NAS – Remote Unauthenticated User To Admin Shell:...

    A number of security vulnerabilities have been identified in two applications hosted on the QNAP App Centre. When...

    Read more
  • Network Security Monitoring With Bro IDS, TCPDump And MongoDB

    Bro IDS is a powerful open source network security monitoring framework which I have had the opportunity to experiment...

    Read more
  • CSRF and unsafe arbitrary file upload in nextgen gallery...

    LRQA's very own consultant explains the detected vulnerability and unsafe arbitrary file upload in NextGEN gallery for Wordpress...

    Read more
  • CSRF And Unsafe Arbitrary File Upload In NextGEN Gallery...

    Please note the vulnerability detailed in this blog article was first discovered on Monday 9th March 2015, disclosed and...

    Read more
  • Windows inline function hooking

    Windows Inline Function Hooking

    Read more
  • Windows Inline Function Hooking

    Hooking can be used by legitimate software for reverse engineering, for example, to examine the user mode function...

    Read more
  • Vulnerability Discovery Via 'Fuzzing'

    Why would you fuzz? People fuzz for many reasons, depending on the industry they are in, from reliable...

    Read more
  • DLL injection: part two

    Read Part Two of our DLL Injection blog, written by Tom Wilson our very own consultant.

    Read more
  • DLL Injection: Part Two

    In a previous blog post I gave a high level overview of DLL injection, what it is used...

    Read more

Error

Error

No results found

No results found that match your query

Loading results