Ajay Yadav

Ajay Yadav is an author, Cyber Security Specialist, SME, Software Engineer, and System Programmer with more than eight years of work experience. He earned a Master and Bachelor Degree in Computer Science, along with abundant premier professional certifications. For several years, he has been researching Reverse Engineering, Secure Source Coding, Advance Software Debugging, Vulnerability Assessment, System Programming and Exploit Development.

He is a regular contributor to programming journal and assistance developer community with blogs, research articles, tutorials, training material and books on sophisticated technology. His spare time activity includes tourism, movies and meditation. He can be reached at om.ajay007[at]gmail[dot]com

Ajay Yadav

Network design: Firewall, IDS/IPS

There are many different types of devices and mechanisms within the security environment to provide a layered approach of defense. This is so that if an atta

Advanced .NET Assembly Internals [Updated 2019]

Abstract In the previous article of this series, we gained an understanding of the assembly loading process, its format and anatomy. This article looks at a

Java Code Embedding in C# [Updated 2019]

Interoperability Between JVM & CLR Abstract[pkadzone zone="main_top"] The real concept driving this article is to develop solutions using the .NET or Jav

Assembly programming with Visual Studio.NET

MASM is maintained by Microsoft and is an x86 assembler that consumes Windows and Intel syntax to produce a COFF executable. It is compatible for both 16 bit

Exploiting Windows 2003 server reverse shell

This paper is intended to explain several Metasploit approaches to exploit the vulnerable Windows 2003 server operating system, especially through msfconsole

Encrypted code reverse engineering: Bypassing obfuscation

Obfuscation is a distinctive mechanism equivalent to hiding, often applied by security developers, to harden or protect the source code (which is deemed as i

Securing IIS Server Checklists

Abstract This paper is designed to demonstrate the common IIS web server security specifications in the form of a checklist that aids web masters or penetrat

Buffer Overflow Attack & Defense

Abstract This paper attempts to explain one of the critical buffer overflow vulnerabilities and its detection approaches that check the referenced buffers at

Invoking Assembly Code in C#

Abstract This article explains the techniques of inline Assembly programming by linking or invoking the CPU-dependent Native Assembly 32-bit code to C#.NET m

ASP.NET Website Optimization

Writing optimized website code is considered to be one the most complicated tasks. Hence, this paper explores amazing server side configuration techniques an

.NET penetration testing: Test case cheat sheet

Having a cheat sheet is a perfect starting initiative to assist you in generating ideas while penetration testing. A test case cheat sheet is often asked for

Hunting Session Fixation Bugs

Improper handling of session variables in asp.NET websites is considered a serious threat and opens various doors to malicious hackers. For instance, a sessi