Hacking March 14, 2011 Jack Koziol Charlie Miller Reveals His Process for Security Research As the first in an ongoing series of interviews, we got recent Pwn2Own winner Charlie Miller to answer a few questions and pull back the curtain a bit on the...
CISSP March 14, 2011 Kenneth Magee CISSP Domain – Cryptography and Security There are books upon books about cryptography and this article will not attempt to regurgitate all of the historical background about the subject. However,...
Hacking March 10, 2011 Stephen Bradshaw Stack Based Buffer Overflow Tutorial, part 3 – Adding shellcode This is the third article in a series of three on stack based buffer overflow. Before you read further, you will want to read the first and second articles. At...
Hacking March 10, 2011 Stephen Bradshaw Stack Based Buffer Overflow Tutorial, part 2 – Exploiting the stack overflow This is the second article in a series of three on stack based buffer overflow. Before you read further, you will want to read the first article. In that article...
Hacking March 10, 2011 Stephen Bradshaw Stack Based Buffer Overflow Tutorial, part 1 – Introduction Introduction This tutorial, in three parts, will cover the process of writing a simple stack based buffer overflow exploit based on a known vulnerability in...
CISSP March 4, 2011 Kenneth Magee CISSP Domain – Telecommunications and Network Security Telecommunications and Network Security is this week’s CISSP domain posting. The dreaded OSI model, there’s no way around it, PDNTSPA or Please Do Not Throw...
Hacking March 1, 2011 Stephen Bradshaw Debugging Fundamentals for Exploit Development Introduction This is a basic exploit writers tutorial for OllyDbg, a 32 bit assembler level analyzing user mode debugger for Windows. Version 1.10 of OllyDbg...
Hacking February 28, 2011 Stephen Bradshaw Tricks for Exploit Development This is the second article in a series about using the OllyDbg, a 32 bit assembler level analyzing user mode debugger for Windows. In part one of this tutorial...
CISSP February 24, 2011 Kenneth Magee CISSP Domain – Physical and Environmental Security This week’s article looks at the Physical and Environmental Security domain of CISSP. First and foremost, (ISC)2 and the CISSP exam consider human safety...
CISSP February 18, 2011 Kenneth Magee CISSP Domain – Security Architecture and Design This article will cover some of the major areas within Security Architecture and Design by looking at: design concepts, hardware architecture, OS and software...