How I logged your credentials on IRC
So, the other day I was watching the “How I Met Your Girlfriend” videos from DefCon 18. Here Samy Kamkar talked about something I had never heard about before. Cross-Protocol Scripting (XPS). This...
View ArticleToday’s learning’s – Buffer overflow, gdb, and more
Welcome to the first article in my “today’s learning’s” series. Last night and today I have been working on the Stack exercises in Protostar from exploit-exercises.com. So far I’ve solved Stack 0...
View ArticleToday’s learning’s – More overflows, ret2libc, opcode and more
This post is a part of my “Today’s Learning’s” series. If you’re interested in, or wonder why, I’m writing these posts please read my article named “My Journey Through 2015“. So! Another day, more...
View ArticleFun with grep and command injection in web applications
The past days I have been playing around with command injection vulnerabilities when grep is used in web applications in combination with user controlled input, and possible ways to bypass different...
View Article
More Pages to Explore .....