Learning C – Part 3 Stacks, Heaps, and Pointers

The terms Stack, Pointers, and Memory are some of the most difficult to master in the C programming language. For this reason, a majority of students and even long-time professionals…

Read more »

Installing WinAFL

Win-AFL's documentation is fairly lacking when it comes to installation procedures with newer toolkits. Because of this, I decided to help the fuzzing and reverse engineering community by writing a…

Read more »

Intro to Networking Part 1 – IPs and DHCP

Networking is arguably one of the most important concepts in computing. While topics like processing and manufacturing are incredibly useful, the concept of connecting to another person or a service…

Read more »

Fuzzing Explained with AFL

What is Fuzzing? Fuzzing is the act of generating a large number of inputs that can be either random or mutated from known good inputs. These inputs are then entered…

Read more »

Attacks Explained – Function Detouring

What is Function Detouring? Function Detouring, sometimes called Function Trampolining, is an interesting reverse engineering technique with a large range of applications. If a piece of software was developed long…

Read more »

Learning C – Part 2 Functions

What is a Function? Functions serve as the foundation to almost any programming language. In our previous part we talked about Variables and Data types which will be critical in…

Read more »

Learning C – Part 1 Variables

“One man’s constant is another man’s variable” -Alan Perlis, Epigrams on Programming, 1982 To kick off our C series, I figured we should go over one of the most common…

Read more »

Attacks Explained – SQL Injection

SQL Injection (SQLi) About SQL Injection is an incredibly common form of attack that comes from non-sanitized inputs that communicate with an SQL Database of some form. While the exact…

Read more »

Standards Explained – HTTP Requests

HTTP Requests The Hyper Text Transfer Protocol (HTTP) contains main different standards that work together to give us the protocol we know today. One of the major standards of HTTP…

Read more »

Attacks Explained – XSS

Cross Site Scripting (XSS) About Cross Site Scripting (XSS) is a common vulnerability often found in web sites and web applications where an attacker can execute code that affects users….

Read more »