What are Command Injection Vulnerabilities?

| | Hacking
Introduction Command injection vulnerabilities are one of the most dangerous web vulnerabilities. Many security testers and bounty hunters aim to find command injection vulnerabilities due to the impact they can create on the target application.  This article will provide an overview of command injection vulnerabilities, along with an introduction to ... Read More

Introduction to Printing and Format Strings

Introduction This article provides an overview of how printing functions work and how format strings are used to format the data being printed. Developers often use print functions for a variety of... Go on to the site to read the full article ... Read More

Format String Vulnerabilities: Use and Definitions

Introduction In the previous article, we understood how print functions like printf work. This article provides further definition of Format String vulnerabilities. We will begin by discussing how... Go on to the site to read the full article ... Read More

How to exploit Format String Vulnerabilities

Introduction In the previous articles, we discussed printing functions, format strings and format string vulnerabilities. This article provides an overview of how Format String vulnerabilities can be... Go on to the site to read the full article ... Read More

Format String Vulnerabilities Exploitation Case Study

| | Hacking
Introduction: In the previous article of this series, we discussed how format string vulnerabilities can be exploited. This article provides a case study of how format string vulnerabilities can be... Go on to the site to read the full article ... Read More

How to mitigate Format String Vulnerabilities

Introduction: This article provides an overview of various techniques that can be used to mitigate Format String vulnerabilities. In addition to the mitigations that are offered by the compilers... Go on to the site to read the full article ... Read More

Basics of Secure coding

| | Basics of Secure coding, Hacking
Introduction: This article provides an overview of secure coding and how it is useful to prevent security vulnerabilities in applications. We will also discuss the benefits of secure coding to... Go on to the site to read the full article ... Read More
Stack Instructions

Stack Instructions

| | Stack Instructions
Introduction This article will introduce readers to the assembly concepts in relation to the stack. We will discuss basic concepts related to stack and various registers, and the instructions used... Go on to the site to read the full article ... Read More
Stepping

Stepping

| | Stepping
Introduction Single-stepping is one of the most powerful features of a debugger, as it allows a reverse engineer to execute a single instruction at a time before returning control to the debugger.... Go on to the site to read the full article ... Read More
Loops

Loops

| | Loops
Introduction In the previous article, we discussed how if statements can be spotted in the disassembly of a binary. We learned that if conditions are translated to conditional jumps when exploring... Go on to the site to read the full article ... Read More
Loading...