A required step to understand buffer overflow
This is not a buffer overflow exploit, but a required background that will help to understand how CPU & memory "collaborate" each other to execute a program.I have read many articles about 'buffer...
View ArticleOld, Good and Funny Trick
This is a very small and simple program that just writes... something to an underused registry value (tested on Win2k, WinXP).Registry is used in Windows (from version 95 and later) to store...
View ArticleResetting root pass without livecd in two steps
[tested on Gentoo 2.6.36 r8] There are cases that we forget our root password and we don't have any live CD to boot from in order to mount our file system. Is there any solution?Yes it is. It is a two...
View ArticleDebugging the Native Windows API
We are going to play a little game. We will search inside the Native Windows Application Programming Interface (API) for functions that used internally by the Windows 7 operating system. The use of...
View ArticleReverse shell through DLL Injection using undocumented API function
This article refers to people who already know how to program in c or c++ and have a basic knowledge of windows API calls. In addition some knowledge of exploitation techniques is needed such as what...
View ArticleAntivirus Hiding
There are a lot of choices when we want to pen test an application.We can create a specific program to do this.We can use an existing one.We can modify (or... fork) an existing. Maybe, the ideal is to...
View ArticleAuthorization Attacks using Session hijacking
AbstractMost of authorization methods are based on the user, password pair, provided by the user. The stateless nature of the Internet requires the server to remember every user that has logged in. Web...
View ArticleHunting asp.net Authentication and Session Ghosts
Asp.net handles the features of user authentication and user session in two different ways that sometimes may produce ghosts (bugs difficult to find) in our web applications. The default forms...
View ArticleBCP on SQL server and how to export metadata like table headers
A known limitation using "bcp" utility in SQL Server (2k5,2k8,2012) is that there is no way to include meta-data (say header names) to any exported table. There are some trick you can do to overcome...
View ArticleImplementing asynchronous callbacks in asp.Net 4
Internet application development can be seen as the a stateless client-server programming using a thin client.In case that we don't like this approach, we have several methods to change it.The cause of...
View ArticleTesting Web Server Performance
Talking about Web Server Performance is a serious matter and for sure is not an easy one to perform. We can safely say that it is one of the few things that make the difference when we are involved in...
View ArticleHow safe is our personal information?
What you will learnHow bad guys use information already exists on the net to gain access to: your email accounts,your financial information such as credit cards, PayPal accounts etc,your internet...
View ArticleIs PHP vulnerable and under what conditions?
[First publication in Greek language at: DeltaXaker Magazine #40].We are going to analyze a special method of attacking Web Servers. It is known as LFI with PHP Info vulnerability [1]. It was first...
View ArticleUncover (very) sensitive info from Google Chrome
In this post I am going to show how we can uncover very sensitive info from Chrome thumbnails in three easy steps. The current, can also be titled as what a bad user can see whenever he/she has...
View ArticleHost ASP.NET Core on Linux with Apache and Kestrel
Since the publication of new release of dotnet (core) v.5 there are several articles about how to setup and run a production environment in a Linux server. To be honest, most of them requires some...
View Article