
Network security
Network design: Firewall, IDS/IPS
There are many different types of devices and mechanisms within the security environment to provide a layered approach of defense. This is so that if an atta

Application security
Advanced .NET Assembly Internals [Updated 2019]
Abstract In the previous article of this series, we gained an understanding of the assembly loading process, its format and anatomy. This article looks at a

Application security
Java Code Embedding in C# [Updated 2019]
Interoperability Between JVM & CLR Abstract[pkadzone zone="main_top"] The real concept driving this article is to develop solutions using the .NET or Jav

Reverse engineering
Assembly programming with Visual Studio.NET
MASM is maintained by Microsoft and is an x86 assembler that consumes Windows and Intel syntax to produce a COFF executable. It is compatible for both 16 bit

Hacking
Exploiting Windows 2003 server reverse shell
This paper is intended to explain several Metasploit approaches to exploit the vulnerable Windows 2003 server operating system, especially through msfconsole

Reverse engineering
Encrypted code reverse engineering: Bypassing obfuscation
Obfuscation is a distinctive mechanism equivalent to hiding, often applied by security developers, to harden or protect the source code (which is deemed as i

Application security
Securing IIS Server Checklists
Abstract This paper is designed to demonstrate the common IIS web server security specifications in the form of a checklist that aids web masters or penetrat

Reverse engineering
Buffer Overflow Attack & Defense
Abstract This paper attempts to explain one of the critical buffer overflow vulnerabilities and its detection approaches that check the referenced buffers at

Penetration testing
.NET penetration testing: Test case cheat sheet
Having a cheat sheet is a perfect starting initiative to assist you in generating ideas while penetration testing. A test case cheat sheet is often asked for