
Linux X86 Assembly – How To Test Custom Shellcode Using a C Payload Tester
Overview In the last blog post in this series, we created a tool to make it easy to build our custom payloads and extract them. However, what if we want to test them before trying to use them? It seems like a good idea to make sure it works before ... Read More
Leapfrog your PKI – Don’t let a skills shortage stifle business possibilities
Most of you will be familiar with the term leapfrog. Stemming from a children’s game, it’s an expression used not... The post Leapfrog your PKI – Don’t let a skills shortage stifle business possibilities appeared first on Entrust Blog ... Read More

Linux X86 Assembly – How to Make Our Hello World Usable as an Exploit Payload
Overview In the last two tutorials, we built a Hello World program in NASM and GAS for x86 assembly. While this can help us learn x86 assembly, it isn’t viable as a payload for use in exploits in its current form. Today’s blog will look into what those issues are, ... Read More

Linux X86 Assembly – How to Build a Hello World Program in GAS
Overview In the last tutorial, we covered how to build a 32-bit x86 Hello World program in NASM. Today, we will cover how to do the same thing, but this time using the GAS toolchain instead. This will allow us to review the differences in the source code syntax and ... Read More

Linux X86 Assembly – How to Build a Hello World Program in NASM
Overview A processor understands bytecode instructions specific to that architecture. We as humans use mnemonics to make building these instructions easier than remembering a bunch of binary codes. These mnemonics are known as assembly instructions. This is one of the lowest levels of programming that can be done. This programming ... Read More

A Hacker’s Tour of the X86 CPU Architecture
Overview The Intel x86 CPU architecture is one of the most prolific CPU architectures for desktops, laptops, and servers. While other architectures exist and are even taking some market share with mobile devices such as smartphones and even Apple begin including its ARM M1 chip in newer Macbooks and Mac ... Read More
New Requirement Will Deprecate the Organization Unit (OU) Field in TLS Certificates
In June 2021, the CA/Browser Forum passed ballot SC47 to remove the organization unit (OU) field from all public trust... The post New Requirement Will Deprecate the Organization Unit (OU) Field in TLS Certificates appeared first on Entrust Blog ... Read More

LD_PRELOAD: How to Run Code at Load Time
Today I want to continue the series on using LD_PRELOAD. In previous posts, we covered how to inject a shared object binary into a process, and use that to hijack a library function call to run our own code. This is great when we want to overwrite the behavior of ... Read More

Converting NMAP XML Files to HTML with xsltproc
NMAP is a wonderful network scanner and its ability to log scan data to files, specifically XML, helps quite a bit. This enables the scan data to be parsed by other tools such as Metasploit’s db_import or even NMAP’s own Zenmap GUI. While XML is great for parsing, it’s not ... Read More

Converting NMAP XML Files to HTML with xsltproc
NMAP is a wonderful network scanner and its ability to log scan data to files, specifically XML, helps quite a bit. This enables the scan data to be parsed by other tools such as Metasploit’s db_import or even NMAP’s own Zenmap GUI. While XML is great for parsing, it’s not ... Read More