Reverse engineering November 16, 2010 Giuseppe Bonfa The Device Driver Process Injection Rootkit Skillset Labs walk you through infosec tutorials, step-by-step, with over 30 hands-on penetration testing labs available for FREE! ...
Reverse engineering November 16, 2010 Giuseppe Bonfa The Kernel-Mode Device Driver Stealth Rootkit Part 1: Introduction and De-Obfuscating and Reversing the User-Mode Agent Dropper Part 2: Reverse Engineering the Kernel-Mode Device Driver Stealth Rootkit Part...
Reverse engineering November 15, 2010 Giuseppe Bonfa Tracing the Crimeware Origins by Reversing Injected Code Part 1: Introduction and De-Obfuscating and Reversing the User-Mode Agent Dropper Part 2: Reverse Engineering the Kernel-Mode Device Driver Stealth Rootkit Part...
Reverse engineering November 12, 2010 Giuseppe Bonfa De-obfuscating and reversing the user-mode agent dropper Part 1: Introduction and De-Obfuscating and Reversing the User-Mode Agent Dropper Part 2: Reverse Engineering the Kernel-Mode Device Driver Stealth Rootkit Part...
General security November 3, 2010 Keatron Evans iPhone App Exposes Pontentially Anyone’s Social Security Number. There has been web sites around for a while that allows one to listen in on certain police, fire department, and other public service radio bands. Now this...
General security September 10, 2010 Jack Koziol Interview with Don Donzal of the Ethical Hacker Network and ChicagoCon Our latest interview is with Donald C. Donzal - perhaps best-known now as the founder and editor of The Ethical Hacker Network and ChicagoCon. Don had his first...
Penetration testing August 27, 2010 Keatron Evans Ideal skill set for the penetration testing Based on questions I've gotten over the years and specifically in class, I've decided that we need to address some basic skills that every penetration tester...