877.791.9571 |

About the Author:

Dejan Lukan is a security researcher for InfoSec Institute and penetration tester from Slovenia. He is very interested in finding new bugs in real world software products with source code analysis, fuzzing and reverse engineering. He also has a great passion for developing his own simple scripts for security related problems and learning about new hacking techniques. He knows a great deal about programming languages, as he can write in couple of dozen of them. His passion is also Antivirus bypassing techniques, malware research and operating systems, mainly Linux, Windows and BSD. He also has his own blog available here: http://www.proteansec.com/.

Facebook Hacker Cup 2013 Qualification Round: Beautiful strings

Here’s my follow-on to the Facebook Hacker Cup. Yesterday, I told you about my take on the Balanced Smileys puzzle. Today, we’ll discuss the easiest challenge, Beautiful Strings. The […]


Facebook Hacker Cup 2013 Qualification Round: Balanced Smileys

I must admit that I was a little bit hesitant whether or not I should enter the Facebook Hacker Cup, but I did it anyway just for the fun […]


Enhanced Mitigation Experience Toolkit (EMET)

Defining the problem

First, we must define the problem before we try to find the solution. The problem with Windows systems is that they can easily be exploited. There are […]


The Basics of ASP.NET


In this article we’ll talk about unicode support in various elements of the HTTP protocol, but first let’s say a few words about HTTP. We won’t go into depth […]


LUKS and Initramfs

Initramfs Introduction

Before we can continue with configuring the kernel when installing a new gentoo system, we need to create an initramfs.

Since the root partition is encrypted, it has to […]


LUKS: Swap, Root and Boot Partitions

The /swap Partition

We need to encrypt the swap partition, since we don’t want encryption keys to be swapped to an unencrypted disk. To do that we can first use […]


WordPress Security for Users



We all know that WordPress is the primary CMS system used on the Internet. We also know that security in WordPress is not always taken for granted. The WordPress […]


LUKS: Formatting the Partition


When writing this tutorial, I’ve referenced the Gentoo Linux guide and added some of my own observations and scripts. This guide should provide you with steps of how […]


IDA: Jumping, Searching and Comments


In this tutorial, we will describe the Jump Menu option in Ida Pro. Using the Jump command when analyzing an executable can prove to be a valuable trick in […]


IDA Functions

Ida is a very good disassembler and its automatic analysis upon loading the executable is quite intense and useful, but nevertheless, it can’t always be right. Sometimes we need […]


IDA: Cross References / Xrefs

Cross references can help us determine where certain functions were called from, which can be useful for a number of reasons. Let’s say that we found the function we’re […]


NMAP Scripting Example

1. Nmap API

When writing Nmap NSE scripts, we of course need to have a way to talk to the Nmap API, which provides us with various advanced features so […]


NMAP Scripting Engine and Categories


1. Introduction

We all know what Nmap is and what we can do with it, but for those of you who don’t, here’s a short overview. Nmap is an open […]


Yara – Rule-based malware detection and analysis

1. Introduction

Yara is a tool that helps us identify and classify malware software samples by the use of rules. We can use Yara to classify files or running processes […]


Hello World: C, Assembly, Object File and Executable


Summary: In this article we’ll take a look at the C program that prints “Hello World!” to the screen, which we’ll assemble and compile. Then we’ll compare the results […]


Pen Testing Domain Controllers


When performing a penetration test, we’re constantly stumbling upon various servers that support domain logins into the customers network. We’re allowed to login if we know the username and […]


Sniffing Network Traffic on Android


There has been a lot of talk about how to connect your laptop though the Android network and use the bandwidth that you’re already paying for. Usually, this requires […]


Reverse-Engineering Arrays


Whenever we would like to reverse-engineer a function, we need to know exactly how the function is being called: its calling convention, number of parameters, parameter types, parameter values, […]


Reverse Engineering Structures


In this part of the tutorial, we’ll take a look at how we can figure out a structure when reverse engineering a binary. First, we must write a C++ […]


Google Hacking with GGGoogleScan

When scraping the Google search engine, we need to be careful so that Google doesn’t detect our automated tool as a bot, which will redirect us to a captcha […]