Reverse Engineering - Understanding Code Obfuscation
This post reflects my interest in malware analysis techniques - it should be considered a "work in progress" rather than a full blown tutorial or walkthrough, »
This post reflects my interest in malware analysis techniques - it should be considered a "work in progress" rather than a full blown tutorial or walkthrough, »
Earlier this year I did an internal presentation to my colleagues at Pentest Ltd on the topic of Malware Analysis and Intelligence Recon. The presentation was »
In this post, I will walk you through a real life example of how I was able to compromise a web application and achieve remote code »
Over the weekend I participated in @zseanos live stream bug bounty mentoring session in which he created an application for viewers to hack live and submit »
Thought I would do a quick write up of a small bug that I found late last year (2018). Unfortunately, the bug was considered out of »
With a few exceptions, the majority of books I have read about pen testing treat reporting as an after thought, with a few pages roughly detailing »