
Malware analysis
Malware Analysis - Follow along reversing the German government's "Bundestrojaner"
Introduction I'm reasonably sure that anyone reading this particular article has heard about viruses, worms, trojans and malware; as well as numerous antivi

Hacking
Creating backdoors using SQL injection
If you're reading this article than I'm reasonably sure that you have heard of a virus, otherwise refered to as a Trojan horse or worm, which can infect your

Digital forensics
Rootkit Detection with Tuluka Kernel Inspector
Introduction A rootkit is a piece of software that is written by someone, who at the very least, wants to spy on specific system calls made by an applicatio

Application security
Blind SQL Injection 1.0 - Attack Anatomy
New SQL Injection Lab! Skillset Labs walk you through infosec tutorials, step-by-step, with over 30 hands-on penetration testing

Application security
HTTP response splitting attack
In this paper we will discuss HTTP Response Splitting and how the attack can actually be carried out. When we're clear about how it works, because it is an o