The Impact of Recent Cyber Attacks on Popular Platforms Words like “privacy” and “confidentiality” and “cyber-security” are thrown around frequently in
HowTo: Writing into process memory with GDB. Use this .gdbinit. Make sure you save it as your ~/.gdbinit file
Rationality & Privacy: How People Make Decisions About Confidentiality “In everything one thing is impossible: rationality.” –Friedrich Nietzsche Unfortunately, Nietzsche’s
Beware: A New Approach To Cyber Security That's Not Safe For Coders Hi there! So this post will be the first in a series
Gera's Insecure Programming Format String #1 A well-known set of vulnerable programs to practice exploitation can be found
HowTo: Metasploit Autopwn Quick Guide 1. Run metasploit: $ ./msfconsole 2. Create the database which metasploit uses to
Weaponizing a XSS vulnerability. During a recent Hack Night, we tested some Content Management Systems and