Hacking

Raising a Rogue Access Point

Introduction Before beginning this article I want to clear up some stuff about awareness. Everything that is going to be described in this article must be

Fuzzing Vulnserver with Sulley: Part 3

1. Introduction Vulnserver is a vulnerable server written by Stephen Bradshaw whose blog is located here: grey-corner. This server was written intentionally

Fuzzing Vulnserver: Discovering Vulnerable Commands: Part 1

1. Introduction Vulnserver is a Windows TCP server running on port 9999. It was written by Stephen Bradshaw whose blog is located here. The server was intent

Getting Your Hands Dirty in x86 Assembly Code

For those of you who have been following my eventful career, you already know that this is actually my second published tutorial. Just to bring you up to dat

Linux TPM encryption: Initializing and using the TPM

Initializing the TPM To secure our data we must first initialize the TPM. What we're actually doing is changing the settings of the hardware TPM chip modu

Antivirus Evasion: The Making of a Full, Undetectable USB Dropper / Spreader

Some Basics and Overview Usually when we talk about bypassing antivirus software, and especially when we talk about antivirus programs like NOD32, Kaspersky

Windows Vulnerability Assessment

Nowadays every enterprise, be it small or large, depends on information technology (IT) for some or most of its operations, and with IT; comes information se

The Browser Exploitation Framework (BeEF) – Part 2

The first article in this series can be found here: The Browser Exploitation Framework (BeEF) – Part 1. 1. Using the Modules In this section we'll describe

The browser exploitation framework (BeEF) – Part 1

We can categorize the BeEF social engineering framework as shown in the picture below: [pkadzone zone="main_top"] [pkadzone zone="main_top"] We

Crack Me Challenge: Final Edition

Part 6 [pkadzone zone="main_top"] [pkadzone zone="main_top"] The code for logical segment 6 is as follows: 0040181F |. B9 10000000 mov ecx,10