Hacking

ESET Rule the Code - CrackMe Challenge Part 1: The Unpacking Process

1. Presenting the Problem The CrackMe challenge was first observed on the ESET CrackMe web page, which looked like the the picture below:[pkadzone zone="main

Sneak Peak into the Art of Exploitation

It's a well-known saying that gathering maximum information about the enemy is half the work done in defeating him. The same holds true when you are about to

JBOSS Exploitation

JBoss Application Server is an open-source Java EE-based application server. JBoss is widely used and is deployed by many organizations on their web servers.

IBM Rational Appscan: Part 2

The first part of this article focused on configuring a scan in Rational Appscan, and as mentioned earlier, it's important to configure the scan based on you

IBM Rational Appscan Part 1

IBM Rational Appscan is one of the most widely used tools in the arena of web application penetration testing. It is a desktop application which aids securit

Sulley Fuzzing Framework Intro

1. Sulley Fuzzing Framework Sulley is python fuzzing framework that can be used to fuzz file formats, network protocols, command line arguments, and other co

WebDAV Application DLL Hijacking Exploitation

In this article, I will explain WebDAV application DLL hijacking exploitation using our all time favorite, Metasploit. Here we will cover the module which ha

Social Engineering 2—What Do We Have To Watch?

In my previous article we focused on providing an introduction to social engineering. For the purposes of this article, I want readers to consider the words

Social Engineering - We Start Playing

If hacking is known as entering a computer system through a breach of security, social engineering can be referred to as an intrusion into the mind. That rea

Malicious code execution in PCI expansion ROM

The malicious code in x86/x64 firmware can potentially reside in many places. One of them is in the PCI expansion ROM. In the past, the small amount of memor