Skip to main content

Blog

SEH Exploitation to Get Shell Access

SEH Exploitation to Get Shell Access

  Structured Exception Handling is a mechanism for handling both hardware and software exceptions in Windows OS. Structured exception handling enables us to have complete control over the handling of exceptions and it also provides support for debuggers as well. SEH exploitation is based on stack buffer overflow technique. It becomes easy to exploit a […]

Our Local Security Meet [14th September ...

Talks: 09:30 – 10:15:  Webworkers for Beginners – Prasanna K Web workers are long-running scripts that are not interrupted by user-interface scripts (scripts that respond to clicks or other user interactions). Keeping such workers from being interrupted by user activities should allow Web pages to remain responsive at the same time as they are running […]

Advanced Malware Analysis Training Sessi...

Advanced Malware Analysis Training Session 8 – Introduction to Android

Here is the quick update on this month’s Local Security meet (SX/Null/G4H/owasp) and our advanced malware training session on Introduction to Android This is part of our FREE ‘Advanced Malware Analysis Training’ series started from Dec 2012.   In this session, Swapnil gave quick introduction to Android explaining technical details as well as various security […]

Announcing Results for the Student Mento...

Announcing Results for the Student Mentorship Programme-2013

  We are very glad to announce the results of our mentorship programme, 2013. In the selection process we first shortlisted the participants on the basis of the answers they provided for questionnaire. The shortlisted candidates were then interviewed by our members. On the basis of their comments following students are selected for this programme. […]

Advanced Malware Analysis Training Sessi...

Advanced Malware Analysis Training Session 7  – Malware Memory Forensics

Here is the quick update on this month’s Local Security meet (SX/Null/G4H/owasp) and our advanced malware training session on Malware Memory Forensics. This is part of our FREE ‘Advanced Malware Analysis Training’ series started from Dec 2012.   In this extended session, Monnappa explained extracting malware forensics artifacts from memory using Volatility – advanced memory […]

Advanced Malware Analysis Training Sessi...

Advanced Malware Analysis Training Session 6  – Sandbox Analysis

Here is the quick update on this month’s Local Security meet (SX/Null/G4H/owasp) and our advanced malware training session on Sandbox Analysis. This is part of our FREE ‘Advanced Malware Analysis Training’ series started from Dec 2012.   In this advanced session, Monnappa delivered extraordinary presentation on malware sandbox analysis explaining overview, architecture with examples.  He […]