877.791.9571 |

About the Author:

ViperEye works for a leading IT company and is deeply passionate about Information Security and Reverse Engineering. ViperEye research interests include Malware Analysis, specifically directed towards executable protections techniques. His other interests include product security, in particular: web applications, stand alone clients, etc.

Heap Overflow: Vulnerability and Heap Internals Explained

1. Introduction

A heap overflow is a form of buffer overflow; it happens when a chunk of memory is allocated to the heap and data is written to this memory […]

Code Injection

Code Injection Techniques

DLL Injection using QueueUserAPC

We begin by creating a process using CreateProcess, which is the where we are trying to inject the code into:

Once the process is created, OpenProcess is […]


Anti-Memory Dumping Techniques

1. Introduction

The term “Memory Dumping” in reverse-engineering is essentially a process of taking a snapshot of the executable.

Taking a snapshot means capturing the state of the executable at a […]


Hacking Applets: A Reverse Engineering Approach

1. Introduction

Web Applications using applets to transfer data between the client and server are hard to manipulate using security holes, because of the simple reason that code within the […]