Skip to main content

SEH Exploitation to Get Shell Access

SEH Exploitation to Get Shell Access

  Structured Exception Handling is a mechanism for handling both hardware and software exceptions in Windows OS. Structured exception handling enables us to have complete control over the handling of exceptions and it also provides support for debuggers as well. SEH exploitation is based on stack buffer overflow technique. It becomes easy to exploit a […]

Our Local Security Meet [14th September ...

Talks: 09:30 – 10:15:  Webworkers for Beginners – Prasanna K Web workers are long-running scripts that are not interrupted by user-interface scripts (scripts that respond to clicks or other user interactions). Keeping such workers from being interrupted by user activities should allow Web pages to remain responsive at the same time as they are running […]

Announcing Results for the Student Mento...

Announcing Results for the Student Mentorship Programme-2013

  We are very glad to announce the results of our mentorship programme, 2013. In the selection process we first shortlisted the participants on the basis of the answers they provided for questionnaire. The shortlisted candidates were then interviewed by our members. On the basis of their comments following students are selected for this programme. […]

Advanced Malware Analysis Training Sessi...

Advanced Malware Analysis Training Session 7  – Malware Memory Forensics

Here is the quick update on this month’s Local Security meet (SX/Null/G4H/owasp) and our advanced malware training session on Malware Memory Forensics. This is part of our FREE ‘Advanced Malware Analysis Training’ series started from Dec 2012.   In this extended session, Monnappa explained extracting malware forensics artifacts from memory using Volatility – advanced memory […]

Advanced Malware Analysis Training Sessi...

Advanced Malware Analysis Training Session 6  – Sandbox Analysis

Here is the quick update on this month’s Local Security meet (SX/Null/G4H/owasp) and our advanced malware training session on Sandbox Analysis. This is part of our FREE ‘Advanced Malware Analysis Training’ series started from Dec 2012.   In this advanced session, Monnappa delivered extraordinary presentation on malware sandbox analysis explaining overview, architecture with examples.  He […]

Mentorship Programme Application Form [2...

Mentorship Programme Application Form [2013-2014]

Today as we celebrate 6 years in our ‘Knowledge Sharing’ work, we are launching second edition of our Student Mentorship Programme. Application Form for session 2013-2014 is online now. To apply to this Mentorship Programme, aspiring students have to fill Mentorship Programme Application form. Please download the form from our Student Mentorship Page here Application […]

Advanced Malware Analysis Training Sessi...

Advanced Malware Analysis Training Session 4 – Anti-Analysis Techniques

Here is the quick update on this month’s Local Security meet (SX/Null/G4H/owasp) where Amit Malik delivered an advanced session on Anti-Analysis Techniques This is part of our FREE ‘Advanced Malware Analysis Training’ series started from Dec 2012.   In this advanced session, Swapnil talked about various anti-analysis techniques involving anti-debugging, anti-vm, anti-anti-reversing  along with practical […]