coreyscorner.hashnode.devSafeguarding the Stack: Ornithology of Stack CanariesDuring the industrial era canaries were given the unforgiving job of determining if working conditions were "safe" for coal miners. Within coal mines toxic fumes can build up, and oxygen can become scarce. The life of the canary was a litmus test for...Apr 25, 2024·12 min read
coreyscorner.hashnode.devIntro to x86 Hacking: Function ProloguesHacking is like doing a magic trick, it impresses the uninitiated precisely because they don't understand what they are seeing. The hacker is a systems thinker, an exceptional one who knows the rules of the system so well that it seems like they are ...Mar 25, 2024·8 min read
coreyscorner.hashnode.devBasic Concepts of x86 Shell CodeOne of my favorite quotes of all time comes from Jon Erickson's Hacking the Art Of Exploitation: "Shellcode is injected into a running program, where it takes over like a biological virus inside a cell." I studied molecular biology in college and t...Oct 25, 2023·5 min read
coreyscorner.hashnode.devHow The Hack Volume I: Phineas Fisher Part IIThe Hacking Team is a team of professional hackers, there is a reason why governments around the world use their services. The exploit kits they build work, when it comes to computers they know what they're doing. We don't know what defensive measure...Oct 9, 2023·9 min read
coreyscorner.hashnode.devA Better Way To Use NmapThere is a reason that Neo uses Nmap at the beginning of The Matrix, it's because Nmap is awesome. I first learned about Nmap while reading Ethical Hacking , my mind was blown. Nearly all of the information I wanted to learn about a target was in the...Oct 3, 2023·2 min read