Hacking

Exploiting format strings: Getting the shell

In this article, we will have a look at how to exploit format String vulnerabilities to get a shell.   In this article, we will briefly have a l

Hooking and Patching Android Apps Using Cydia Substrate Extensions

Introduction: In one of the previous articles, we have discussed how to exploit debuggable applications on Android. You can find that one here. Exploiting de

Exploiting ImageTragick

This article explains a recently discovered ImageTragick bug and how to find, exploit and fix it. [pkadzone zone="main_top"] Overview Few weeks ag

Android hacking: Dumping and analyzing application’s memory

In this article, we will discuss how to dump the memory of a specific application using Android Studio's heap dump feature. We will also explore EclipseMemor

A Case Study of Information Stealers: Part II

Introduction: In the second part of this analysis, we will be exploring how Pony steals data and how it sends it to the C&C server. We are equally intere

Attacking WPA2 enterprise

The widespread use of mobile and portable devices in the enterprise environment requires a proper implementation of the wireless network infrastructure to pr

Hacking ZigBee networks

What is ZigBee? Internet of Things (IoT) is what most experts consider as the next step of the Internet revolution where physical objects are invariably lin

Windows exploit suggester – An easy way to find and exploit windows vulnerabilities

During our penetration testing engagements, we often come across the situations where we need to find the right exploits to escalate the privileges on a comp

Exploiting corporate printers

Printer exploitation and vulnerability in printers are serious problems, similar to those faced with computers and other hard drive devices, since they are c

Covering Tracks of Attacks

In this article, we will learn about the most frequent ways used by attackers to cover their tracks. This will include covering tracks in networks, Windows,