877.791.9571 |

About the Author:

Dejan Lukan is a security researcher for InfoSec Institute and penetration tester from Slovenia. He is very interested in finding new bugs in real world software products with source code analysis, fuzzing and reverse engineering. He also has a great passion for developing his own simple scripts for security related problems and learning about new hacking techniques. He knows a great deal about programming languages, as he can write in couple of dozen of them. His passion is also Antivirus bypassing techniques, malware research and operating systems, mainly Linux, Windows and BSD. He also has his own blog available here: http://www.proteansec.com/.
analysis

Environment for Malware Analysis

Introduction

Before trying to analyze any kind of malware, we need to have a proper environment set up, so we can be most efficient and collect the most information from […]

javascript

Analyzing Malicious JavaScript

1. Introduction

Nowdays there are various threats in the wild that want to get malware installed on victim operating systems. Most of them use some kind of social engineering bundled […]

keyboard

PDF File Format: Basic Structure

1. Introduction

We all know that there are a number of attacks where an attacker includes some shellcode into a PDF document, which uses some kind of vulnerability in how […]

network

Wfuzz and WebSlayer

1. Introduction

WfFuzz is a web application bruteforcer that can be considered an alternative to Burp Intruder as they both have some common features. With both Wfuzz and Burp Intruder […]

topology

Network Topology

1. Introduction

Whenever we’re doing a penetration test, it’s good to figure out the topology of the network we’re testing. We can’t figure out the whole topology, because we don’t […]

metsploit.png

Q: A Collection of Metasploit Modules Not Accepted to Main Trunk for Various Policy or Quality Reasons

Introduction

I guess we all know what Metasploit is, so we don’t really need to present to the reader the basics of Metasploit. But it’s still useful if we present […]

abstract binary

Hacking SVN, GIT, and MERCURIAL

1. Introduction

We all know that when programming with a small or large team, having a revision control in place is mandatory. We can choose from a number of revision […]

adobewarning

Hacking PDF: util.prinf() Buffer Overflow: Part 2

For part 1 of this series, click here.

1. Introduction

In the previous part we’ve seen the structure of the PDF document and extracted the JavaScript contained in object 6. We […]

light computer

Filter Evasion: Part 2

For part 1 of this series, please click here.

1. Methods for Bypassing a Filter

There is a number of different attack strings that can be used to bypass a filter […]

light computer

Filter Evasion: Part 1

1. Introduction

First we must talk about vulnerabilities. We know that vulnerabilities that are present in any kind of software can be exploited by accepting the right input data, and […]

adobewarning

Hacking PDF: util.prinf() Buffer Overflow: Part 1

1. Introduction

One of the first things we need to do is to remove the PDF Reader we currently have installed and reinstall the old version of PDF Reader.

The old […]

prineville-servers-1000

Apache JMeter Part 4: Testing the Throughput and Performance of InfoSec Institute

For part 3 of this series, click here.

1. Testing the Throughput of InfoSec Institute

1.1. Running the JMeter

When everything is set-up all that is left for us to do is […]

prineville-servers-1000

Apache JMeter Part 3: Testing Website Performance

1. Summary

We’ve already described most of JMeter in part 1 and part 2, but let’s summarize what we’ve learned so far. We’ve seen that JMeter consists of the following […]

prineville-servers-1000

Apache JMeter: Part 2

,

For Part 1 of this series, please click here.

1. Test Plan Elements

Up until now we haven’t said anything about how to actually do something useful with JMeter, but it’s […]

prineville-servers-1000

Apache JMeter: Part 1

1. Introduction

Apache JMeter is a program that can test the performance of various servers. It natively supports the following protocols:

HTTP(S)
LDAP
JMS
SOAP
JDBC (needs appropriate JDBC driver)
SMTP(S)
POP3(S)
IMAP(S)

Besides those, JMeter also has a […]

TheMatrixWallpaper800

Blacklists and Fast Flux Domains

Blacklists and Fast Flux Domains

1. Blacklists

Several web pages that maintain blacklists exist these days. These web pages maintain IP addresses and domains that are believed to be malicious, but […]

snoop

DNS Cache Snooping

1. Introduction

DNS or name servers are servers that resolve a hostname to their IP representation. There are numerous DNS servers out there, all of which resolve specific domains, but […]

virusqueue

Open Source Antivirus: ClamAV

1. Introduction

We all know that checking downloaded files for virus signatures should be a mandatory thing to do nowadays because of all the malware existing in the world. ClamAV […]

20080602123632_reverse_building

Reverse Engineering Tools

1. Introduction

First, we’re going to describe the process of compiling/assembling a source code to an executable file. This is very important, so we need to understand it when reverse […]

pword

Fuzzing Vulnserver with Sulley: Part 3

1. Introduction

Vulnserver is a vulnerable server written by Stephen Bradshaw whose blog is located here: grey-corner. This server was written intentionally to be vulnerable, so we can learn fuzzing […]