General security March 22, 2011 Jack Koziol HD Moore Reveals His Process for Security Research In our ongoing series of interviews, we got HD Moore to answer a few questions and pull back the curtain a bit on the methods, tools and motivation for the...
Application security March 21, 2011 Russ McRee OWASP top 10 tools and tactics A tool for each of the OWASP Top 10 to aid in discovering and remediating each of the Top Ten If you've spent any time defending web applications as a security...
Penetration testing March 18, 2011 Jeremy Martin Standards for Penetration Testing The cost and quality of penetration tests vary wildly between different vendors. As a response to those differences, a group of security professionals have...
Retired March 17, 2011 Kenneth Magee CISSP Domain – Business Continuity and Disaster Recovery Note: The information in this article is out of date. Check out our CISSP hub for the most up-to-date information. You only have to turn on the TV and watch...
Hacking March 14, 2011 Jack Koziol Charlie Miller Reveals His Process for Security Research As the first in an ongoing series of interviews, we got recent Pwn2Own winner Charlie Miller to answer a few questions and pull back the curtain a bit on the...
Hacking March 10, 2011 Stephen Bradshaw Stack Based Buffer Overflow Tutorial, part 3 – Adding shellcode This is the third article in a series of three on stack based buffer overflow. Before you read further, you will want to read the first and second articles. At...
Hacking March 10, 2011 Stephen Bradshaw Stack Based Buffer Overflow Tutorial, part 2 – Exploiting the stack overflow This is the second article in a series of three on stack based buffer overflow. Before you read further, you will want to read the first article. In that article...
Hacking March 10, 2011 Stephen Bradshaw Stack based buffer overflow tutorial, part 1 – Introduction This tutorial, in three parts, will cover the process of writing a simple stack based buffer overflow exploit based on a known vulnerability in the Vulnserver...
Hacking March 1, 2011 Stephen Bradshaw Debugging Fundamentals for Exploit Development Introduction This is a basic exploit writers tutorial for OllyDbg, a 32 bit assembler level analyzing user mode debugger for Windows. Version 1.10 of OllyDbg...
Hacking February 28, 2011 Stephen Bradshaw Tricks for exploit development This is the second article in a series about using the OllyDbg, a 32 bit assembler level analyzing user mode debugger for Windows. In part one of this tutorial...