Let’s present the whole PE file structure with the picture below (taken from ): At the beginning there’s a DOS header, which is an MS-DOS
Introduction The purpose of this work is to present the reader research of the Gauss malware platform as one of the ultimate nation-state cyber exploitation
Introduction Have you ever checked out an IOS app and thought it was cool, and wondered if you could find some information about the source
With the ever increasing cases of malware, many of the youngsters are switching over to analyzing malwares and its various aspects. A simple search in
1. Introduction As we know, today’s web technology advances are fast in good and bad ways. With almost every technology, if not used properly, its
Introduction The interest in Bitcoin, one of the most popular currency schemas is high, financial world, small savers, merchants and of course, cyber-criminals observing with
Local File Inclusion or LFI is a kind of web exploit or vulnerability that allows an attacker to inject directory-traversal characters on a certain website.
DLL Injection using QueueUserAPC We begin by creating a process using CreateProcess, which is the where we are trying to inject the code into: Once
Recent security advisories reveal that the web exploit kits like the Blackhole Exploit Kit are responsible for the vast majority of web attacks and malware
Introduction: We are all aware of Google/Yahoo/Bing Search engines; they need no introduction. We use them every now and then to solve our day-to-day queries.
Google has been used ever since its beginning to find answers for most if not all of our questions from the beginning of the universe
No need for an introduction, Google is quite possibly the more powerful search engine used today, even used sometimes to check our connectivity; except that
1. Introduction This article describes the stack. GDB is used to analyze its memory. One needs to know this subject to play with low-level security.
You can take a look at the previous article before reading this one. If you already understand the basics of IAT table, then you can skip
Behind the GhostNet notion stands an entire international worldwide network of infected computers belonging to places having high political, economic, media, or emblematic importance. One
Introduction In this article series, we will be learning about the tools and techniques required to perform penetration testing and Vulnerability assessment on IOS Applications.
Introduction The .NET framework caters to different types of authentication mechanisms to use within your applications – —including basic authentication, digest authentication, forms authentication, Passport,
Botnets and cybercrime – Introduction can be found here Botnets, how do they work? Architectures and case studies – Part 2 can be found here
For Part I, which discusses Mass Phishing and which sets the objects of examination in this paper, please check here. For Part II, which discusses