A Brief Introduction to RMF

Written by Immaculate Tact: I don’t pretend to cover new ground here, but RMF is as good a starting place as any. Every exploit eventually meets an equally adequate or…

Read more »

Fuzzing Explained with AFL

What is Fuzzing? Fuzzing is the act of generating a large number of inputs that can be either random or mutated from known good inputs. These inputs are then entered…

Read more »

VStarCam – An Investigative Security Journey – Part 1 – by RedCodeFinal

Today I wanted to talk about a project I’ve been working on, and detail some of the things I found and stuff I tried. I think it’ll be a good…

Read more »

social engineering part 2: real world attacks

     Picture this: it’s your first week at work, you just started working as a front desk manager at a major tech company. The boss is out of town…

Read more »

social engineering part 1: what is it?

     Picture this: it’s a late Thursday afternoon. You just got off work, you’re tired, and you want to relax. You sit down, turn on the tv, and browse…

Read more »

Attacks Explained – Function Detouring

What is Function Detouring? Function Detouring, sometimes called Function Trampolining, is an interesting reverse engineering technique with a large range of applications. If a piece of software was developed long…

Read more »

Learning C – Part 2 Functions

What is a Function? Functions serve as the foundation to almost any programming language. In our previous part we talked about Variables and Data types which will be critical in…

Read more »

Learning C – Part 1 Variables

“One man’s constant is another man’s variable” -Alan Perlis, Epigrams on Programming, 1982 To kick off our C series, I figured we should go over one of the most common…

Read more »

Attacks Explained – SQL Injection

SQL Injection (SQLi) About SQL Injection is an incredibly common form of attack that comes from non-sanitized inputs that communicate with an SQL Database of some form. While the exact…

Read more »

Standards Explained – HTTP Requests

HTTP Requests The Hyper Text Transfer Protocol (HTTP) contains main different standards that work together to give us the protocol we know today. One of the major standards of HTTP…

Read more »