PDF File Format: Basic Structure [updated 2020]
Introduction We all know that there are a number of attacks where an attacker includes some shellcode in a PDF document. This shellcode uses some kind of vulnerability in how the PDF document is... Go on to the site to read the full article ... Read More
What is a Honey Pot?
1. Introduction Honeypots are special programs that are written for a sole purpose: to be exploited. Honeypots can emulate the existence of the vulnerability, so the attackers, viruses and worms are... Go on to the site to read the full article ... Read More
Crack Me Challenge Part 4
First we must take a look at the following piece of code that will be presented in the code segment 5: 004017FC |. B8 40000000 mov eax,40 00401801 |. 33C9 xor ecx,ecx 00401803 |>... Go on to the site to read the full article ... Read More
Gentoo Hardening: Part 4: PaX, RBAC and ClamAV [Updated 2018]
Grsecurity and Xorg If we enable the “Disable privileged I/O” feature in the hardened kernel and reboot, we can’t start X server. That’s because Xorg uses privileged I/O... Go on to the site to read the full article ... Read More