Hacking

Hacking PDF: util.prinf() Buffer Overflow: Part 1 [Updated 2019]

1. Introduction One of the first things we need to do is to remove the PDF Reader we currently have installed and reinstall the old version of PDF Reader.[pk

PHP email injection example [Updated 2019]

Nowadays, internet usage is growing dramatically, but the vast majority of internet users don't have a security background. Most of people use the Internet f

Anti-debugging and anti-VM techniques and anti-emulation [updated 2019]

These days malware is becoming more advanced. Malware Analysts use lots of debugging software and applications to analyze malware and spyware. Malware author

Hacking PDF: util.prinf() Buffer Overflow: Part 2 [Updated 2019]

For part 1 of this series, click here. 1. Introduction In the previous part we've seen the structure of the PDF document and extracted the JavaScript conta

Top ten hacking tools of 2019

Ethical hacking tools Hacking, which was once considered the exclusive domain of the "experts" has become a very common phenomenon with the rise of technolo

The ultimate guide to ethical hacking

Penetration testing and ethical hacking are often used interchangeably when people talk about networking and cybersecurity. Currently, the demand for cyberse

Intercepting HTTPS traffic with Burp Suite

Proxies like the one included in Burp Suite are designed for traffic interception. This allows the owner of the proxy to view, modify and drop packets passin

Return Oriented Programming (ROP) attacks

According to Wikipedia, "Return-oriented programming (also called "chunk-borrowing à la Krahmer") is a computer security exploit technique in which the attac

Hacking web authentication - part one

Authentication is the process of validating something as authentic. When a client makes a request to a web server for accessing a resource, sometimes the web

Android hacking and security, part 2: Content provider leakage

In the previous article, we discussed how an attacker exploits vulnerable Activity Components and ways to secure them. In this article, we will discuss "Cont