Gera's Insecure Programming Format String #5 (ASLR Bypass) This post is long overdue. I decided to step it up from
Gera's Insecure Programming Format String #4 One more completed challenge is needed before we can declare format strings
Cross-Origin Resource Inclusion This article discusses a new bug class that was introduced in XMLHttpRequest
Gera's Insecure Programming Format String #3 This gera's insecure programming challenge is solvable (pwnable) in a
Writeup: DEFCON 19 quals (Binary L33tness 100) Here is the write-up for the DEFCON 19 quals challenge b100 run
RELRO: RELocation Read-Only This article describes ELF relocation sections, how to abuse them for arbitrary
Gera's Insecure Programming Format String #2 Now that this semester is completed, I can continue going through gera&
Rudimentary Treatise on the Construction of Locks, 1853 (excerpt) A commercial, and in some respects a social, doubt has been started
The Consequences of Attacks on Major Global Institutions Evidence of recent attacks on major political and financial systems suggests that