Hacking December 15, 2010 Stephen Bradshaw Fuzzer Automation with SPIKE This is continued from the previously posted Introduction to Fuzzing article. Automating the SPIKE Fuzzing of Vulnserver What we need is a way to send multiple...
Hacking December 11, 2010 Stephen Bradshaw An introduction to fuzzing: using fuzzers (SPIKE) to find vulnerabilities This article discusses the process of fuzzing an application to find exploitable bugs. Vulnserver, a TCP server application deliberately written by Stephen...
Incident response November 22, 2010 Russ McRee Security Incident Response Testing To Meet Audit Requirements Description: Practical guidance and tools to ensure maximum readiness for incident response teams including drill tactics. PCI-DSS audits often require IR testing...
Hacking November 19, 2010 Keatron Evans Advanced Tutorial: Man in the Middle Attack Using SSL Strip – Our Definitive Guide We got a lot of great feedback from our first Man in the Middle Video so we decided to double-down and give you guys some really juicy MitM demos and analysis....
Reverse engineering November 16, 2010 Giuseppe Bonfa The Device Driver Process Injection Rootkit Skillset Labs walk you through infosec tutorials, step-by-step, with over 30 hands-on penetration testing labs available for FREE! ...
Reverse engineering November 16, 2010 Giuseppe Bonfa The Kernel-Mode Device Driver Stealth Rootkit Part 1: Introduction and De-Obfuscating and Reversing the User-Mode Agent Dropper Part 2: Reverse Engineering the Kernel-Mode Device Driver Stealth Rootkit Part...
Reverse engineering November 15, 2010 Giuseppe Bonfa Tracing the Crimeware Origins by Reversing Injected Code Part 1: Introduction and De-Obfuscating and Reversing the User-Mode Agent Dropper Part 2: Reverse Engineering the Kernel-Mode Device Driver Stealth Rootkit Part...
Reverse engineering November 12, 2010 Giuseppe Bonfa De-obfuscating and reversing the user-mode agent dropper Part 1: Introduction and De-Obfuscating and Reversing the User-Mode Agent Dropper Part 2: Reverse Engineering the Kernel-Mode Device Driver Stealth Rootkit Part...
General security November 3, 2010 Keatron Evans iPhone App Exposes Pontentially Anyone’s Social Security Number. There has been web sites around for a while that allows one to listen in on certain police, fire department, and other public service radio bands. Now this...
General security October 26, 2010 Dinesh Mistry 3 Simple Ways to Recon Yourself Dinesh Mistry is currently in his 2nd year as a full time Security Professional. He will be writing a column for resources.infosecinstitute.com and will be...