Learning C – Part 3 Stacks, Heaps, and Pointers
The terms Stack, Pointers, and Memory are some of the most difficult to master in the C programming language. For this reason, a majority of students and even long-time professionals…
Read more »Installing WinAFL
Win-AFL's documentation is fairly lacking when it comes to installation procedures with newer toolkits. Because of this, I decided to help the fuzzing and reverse engineering community by writing a…
Read more »A Brief Introduction to RMF
Written by Immaculate Tact: I don’t pretend to cover new ground here, but RMF is as good a starting place as any. Every exploit eventually meets an equally adequate or…
Read more »Fuzzing Explained with AFL
What is Fuzzing? Fuzzing is the act of generating a large number of inputs that can be either random or mutated from known good inputs. These inputs are then entered…
Read more »VStarCam – An Investigative Security Journey – Part 1 – by RedCodeFinal
Today I wanted to talk about a project I’ve been working on, and detail some of the things I found and stuff I tried. I think it’ll be a good…
Read more »social engineering part 2: real world attacks
Picture this: it’s your first week at work, you just started working as a front desk manager at a major tech company. The boss is out of town…
Read more »social engineering part 1: what is it?
Picture this: it’s a late Thursday afternoon. You just got off work, you’re tired, and you want to relax. You sit down, turn on the tv, and browse…
Read more »Learning C – Part 2 Functions
What is a Function? Functions serve as the foundation to almost any programming language. In our previous part we talked about Variables and Data types which will be critical in…
Read more »Learning C – Part 1 Variables
“One man’s constant is another man’s variable” -Alan Perlis, Epigrams on Programming, 1982 To kick off our C series, I figured we should go over one of the most common…
Read more »Attacks Explained – SQL Injection
SQL Injection (SQLi) About SQL Injection is an incredibly common form of attack that comes from non-sanitized inputs that communicate with an SQL Database of some form. While the exact…
Read more »