Lisa Gomezvission.hashnode.dev·Sep 25, 2023The Role of Governments to Stop Exploitation at WorkIn a democratic country, the government is an instrumental force which can bring new rules and laws for its people. The best part is that it is not that the government is doing this out of goodwill, but it falls under its obligation to look after its...DiscussExploitation
Arshan DabirsiaghiforPixee Blogblog.pixee.ai·Sep 19, 2023Breaking down the Node.js sandbox bypass CVE-2023-30587Turns out, a lot of people want to try to safely run untrusted code, and that's hard. Pixee Engineer Matt Austin (@mattaustin) recently found a bypass of the new and experimental Node.js sandbox in versions before 20.3.1, and it just received a $3K a...Discuss·2 likes·585 readsSecurity
Fawaz KhosaifanforCD !ROOT Blogscdunroot.hashnode.dev·Sep 18, 2023ExploitationOverview The exploitation phase is the phase where the tester tries to gain access to the system using the vulnerabilities identified in the previous phase. The exploitation phase is important because: It helps to determine the severity of the vulne...DiscussPenetration Testing PhasesExploitation
Talsonripp3rdoc.hashnode.dev·Aug 25, 2023SigReturn-Oriented Programming (SROP) Technique — Binary ExploitationReturn-Oriented Programming (ROP) stands as a prominent technique employed in the realm of exploitation, effectively circumventing security mechanisms such as NX/DEP. By delving into the intricacies of the ROP technique, an array of innovative "retur...Discuss·7 likes·335 readsreturn oriented programming
Marcos Azevedonullprofile.com·Jan 18, 2023Impacket ToolsWhat is Impacket? Impacket is a collection of Python classes for working with network protocols. Impacket is focused on providing low-level programmatic access to the packets and for some protocols (e.g. SMB1-3 and MSRPC) the protocol implementation ...Discuss·73 readsPython
Farhan Ashrafblog.farhanashraf.dev·Dec 19, 2022Threat Actors and the Attack SurfaceThreat actors are individuals or groups that attempt to compromise a computer system or organization for their own benefit. These actors may be motivated by financial gain, political ideology, or a desire to cause disruption. In order to execute an a...Discuss·60 readsThreat actors