Reverse engineering

Reverse Engineering with Reflector: Part 1

Abstract This paper intended to teach sophisticated reverse engineering tactics, mainly by using Red Gate Reflector. This article demystifies dissembling and

Remoting Technology

Distributed Computing Abstract[pkadzone zone="main_top"] This article covers the means of cross-process and cross-machine interaction of applications develop

Reverse engineering with OllyDbg

The objective of writing this paper is to explain how to crack an executable without peeping at its source code by using the OllyDbg tool. Although, there ar

Understanding Session Fixation

1. Introduction Session ID is used to identify the user of web application. It can be sent with the GET method. An attacker can send a link to the user wit

Optimizing Managed Code Execution

Abstract As an application grows ever more complex, it is necessary to build a more efficient and faster .NET application that requires a special treatment

File system manipulation

This article shows how to perform tasks involving reading and writing files from various partitions by using the C#.net programming API. In particular, it co

The BodgeIt store part two

Before we go any further, I would like to focus on how a developer thinks and likes to manage a web application development process. During the developmen

The BodgeIt store part one

The Bodgelt store The BodgeIt Store created by Psiinon is a vulnerable web application. It consists of a wide variety of vulnerabilities and is NOT intend

Understanding Windows Internal Call Structure

Microsoft Windows is a modular architecture. Windows Components are split into smaller pieces known as DLL (Dynamic-Link Library) and sys files (system files

Pin: Dynamic Binary Instrumentation Framework

Introduction Pin is a DBI framework for IA-32 and x86-64 architectures, which can be used for dynamic analysis of the binary program at run time. When using