Skip to main content

SEH Exploitation to Get Shell Access

SEH Exploitation to Get Shell Access

  Structured Exception Handling is a mechanism for handling both hardware and software exceptions in Windows OS. Structured exception handling enables us to have complete control over the handling of exceptions and it also provides support for debuggers as well. SEH exploitation is based on stack buffer overflow technique. It becomes easy to exploit a […]

Reversing Training Session Part 11 – Exp

Reversing Training Session Part 11 – Exploit Development [Advanced]

Here is the quick update on this month’s Local Security meet (SX/Null/G4H/owasp) where Amit has delivered one of his best session on ‘Practical Reversing VI – Exploit Development Advanced’. This is part of our ongoing FREE ‘Reversing & Malware Analysis Training’ started since our Jan 2012 meet. Today we had solid response from the crowd […]

Book of the Month – Metasploit: The Pene

Book of the Month – Metasploit: The Penetration Tester’s Guide

It gives me great pleasure to review this book ‘Metasploit – The Penetration Tester’s Guide’, not only because it is written on most popular penetration testing framework but the way it is written doing complete justice to the title! . . Here is the core information about the book, Title: Metasploit: The Penetration Tester’s Guide […]

‘Password Security’ Presentation at IIT

‘Password Security’ Presentation at IIT Guwahati

Here is brief capture of the security conference “Information Security Education & Awareness 2011” (ISEA) held at IIT Guwahati where I presented ‘Primer on Password Security’. This event was held as part of initiative to educate masses on growing trends and latest topics of information security. . On the first 2 days of the event, […]

Facebook Chief Security Officer to Keyno...

Facebook Chief Security Officer to Keynote 2nd Annual HITB Security Conference in Europe

After the success of last year’s inaugural event, Hack In The Box Security Conference is taking over the Krasnapolsky once again from the 17th till the 20th of May. This deep knowledge security conference brings a unique mix of security professionals, researchers, law enforcement and members of the hacker underground under one roof, with the […]

Book of the Month – Mobile Malware Attac

Book of the Month – Mobile Malware Attacks and Defense

As mobile devices becoming more and more sophisticated with their computing power and memory, the attackers are slowing shifting their focus from PC to these Mobile devices. Unlike earlier generation of mobile devices, current mobile devices are as powerful as our computer systems with increased memory and performance along with built-in internet connectivity. All of […]