RivanorthProblog.rivanorth.com·Nov 5, 2024Vulnerability Report: November 2024Welcome to the monthly Vulnerability Report. In this report, we provide an overview of the most significant security vulnerabilities identified in the past month. Our focus is on vulnerabilities that are being actively exploited, which pose the bigge...DiscussSecurity AdvisoryCVE
J3bitokjebitok.hashnode.dev·Oct 30, 2024Exploitation Basics: Metasploit: Exploitation (TryHackMe)In this article, I will write a write-up for Metasploit: Exploitation that covers the Scanning, The Metasploit Database, Vulnerability Scanning, Exploitation, and Msfvenom. I would be lying if I said going through this room was easy. I had to researc...Discuss·114 readsmetasploit
Auth0x78auth0x78-blog.hashnode.dev·Oct 10, 2024Buffer Overflow Basics: A Simple Guide to Understanding VulnerabilitiesIntroduction Have you ever wondered how seemingly harmless input can compromise a program's security? Buffer overflows have become a notorious weapon in the hands of attackers, allowing them to manipulate memory and execute malicious code. In this bl...Discuss·1 likeBuffer Overfow
RivanorthProblog.rivanorth.com·Aug 2, 2024Vulnerability Report: August 2024Welcome to the monthly Vulnerability Report. In this report, we provide an overview of the most significant security vulnerabilities identified in the past month. Our focus is on vulnerabilities that are being actively exploited, which pose the bigge...DiscussSecurity AdvisoryCVE
Achal Tiwariachaltiwari.hashnode.dev·Jul 22, 2024ShellCode 1.0Hey there! Today, we're diving into the fascinating and somewhat intimidating world of shellcode. If you've ever wondered how hackers manage to take control of a compromised machine, shellcode is often a big part of the answer. Let's break it down to...DiscussMalware
Corey Gardnercoreyscorner.hashnode.dev·Apr 25, 2024Safeguarding the Stack: Ornithology of Stack CanariesDuring the industrial era canaries were given the unforgiving job of determining if working conditions were "safe" for coal miners. Within coal mines toxic fumes can build up, and oxygen can become scarce. The life of the canary was a litmus test for...Discuss·26 readsStack Overflow
Reza RashidiforRedTeamReciperedteamrecipe.com·Apr 25, 2024ASLR Exploitation TechniquesAddress Space Layout Randomization (ASLR) is a security technique used in operating systems to protect against certain types of cyber attacks, particularly buffer overflow attacks. Here’s an overview of ASLR: What is ASLR? ASLR is a feature implement...Discuss·2.0K readsaslr
Sukrit Duasukritdua.com·Mar 8, 2024Android Hacking - Part 5Activities What is an Activity? Activities are simply the screens we see when we open an application. Let's say we are greeted with the following Screens (Activities) Login page (LoginActivity.java) Profile page (ProfileActivity.java) Settings pag...DiscussMobile Security Android
Greg BulmashforGitGuardiangitguardian.hashnode.dev·Jan 29, 2024Five Ways Your CI/CD Tools Can Be ExploitedWe've talked about how Continuous Integration and Continuous Delivery (CI/CD) tools can be a source of secrets sprawl. While it's not as insecure as leaving them laying around in a publicly accessible file, CI/CD pipelines can be exploited in a numbe...DiscussSecurity
d0razid0razi.hashnode.dev·Nov 19, 2023Stack pivotingStack pivoting이란? ROP를 해야하는데 ret까지 밖에 bof가 가능할 때 사용 가능한 기법입니다. 특정 영역에 Write 권한이 있을때 영역에 가젯들을 세팅해놓고 sfp를 조작하고 ret에 leave; ret 가젯을 넣어서 원하는 주소를 실행시킬 수 있습니다. leave; ret 가젯 leave와 ret 명령어는 각각 아래와 같은 동작을 합니다. leave mov esp, ebp pop ebp ret pop eip jmp...DiscussPwnable