Hacking

The Mechanics of Metasploit

Metasploit is exquisitely prevalent amongst penetration testers and especially hackers because it makes it very easy to develop and launch exploits for softw

Vulnerability Scanning with Metasploit Part I

Metasploit Framework, the Metasploit Project's best-known creation, is a software platform for developing, testing, and executing exploits. It can be used to

Invalid SSL certification exploitation

Internet usage is growing dramatically, but the vast majority of Internet users don't have any security backgrounds. Nor do a large majority of companies car

Analyzing malicious PDFs

PDF files have become very common in everyday work. It's hard to imagine business proposals without PDFs. The PDF format is used in almost all companies to s

Exploiting Linux Kernel Heap Corruptions (SLUB Allocator)

1. Introduction In recent years, several researchers have studied Linux kernel security. The most common kernel privilege vulnerabilities can be divided into

Brainpan

Brainpan is a vulnerable virtual machine created by superkojiman. It's a vulnerable virtual machine with vulnerable services and it's not intended for produc

Port scanning using Scapy

TCP connect scan TCP connect is a three-way handshake between the client and the server. If the three-way handshake takes place, then communication has be

CSRF proof of concept with OWASP ZAP

This article introduces CSRF (cross-site request forgery) vulnerability and demonstrates how to prepare a CSRF proof of concept with OWASP ZAP. [pkadzone

BEAST vs. CRIME attack

Some months ago there was a top story popping up in almost all the security news feeds about CRIME attacks being able to break SSL. In this article, I would

Hardware attacks, backdoors and electronic component qualification

The capillary diffusion of technology in our society has an important consequence. Hardware has to be properly analyzed during acquisition and qualification