The macabre dance of memory chunks

In this post, we want to share some notes on how to exploit heap-based overflow vulnerabilities by corrupting the size of memory chunks. Please note that we do not present here original content but only want to share with the community two detailed write-up. The first one exploits a basic heap-based overflow by enlarging the... Continue Reading →

Hackers do the Haka – Part 1

Haka is an open source network security oriented language that allows writing security rules and protocol dissectors. In this first part of a two-part series, we will focus on writing security rules. What is Haka Haka is an open source security oriented language that allows specifying and applying security policies on live captured traffic. Haka... Continue Reading →

Blog at WordPress.com.

Up ↑