Quantcast
Channel: Ionut Popescu – Security Café
Browsing all 8 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Intercepting functions from statically linked libraries

A common technique for blackbox penetration testing of a binary application is intercepting function calls. This technique helps the pentester to properly understand how the application works and to...

View Article



Image may be NSFW.
Clik here to view.

Upgrade your DLL to Reflective DLL

If you want to execute code stealthily on a machine and the antivirus stands in your way, you should think about avoiding the disk because this is the place where the antivirus reigns. In this...

View Article

Image may be NSFW.
Clik here to view.

Writing a Metasploit post exploitation module

The exploitation of a machine is only one step in a penetration test. What do you do next? How can you pivot from the exploited machine to other machines in the network? This is the phase where you...

View Article

Image may be NSFW.
Clik here to view.

My first Defcon experience

Defcon is a meta-conference which anyone passionate by IT security should attend. It is more than a conference, it is the heaven of hackers and security professionals, a place where definitely you will...

View Article

Image may be NSFW.
Clik here to view.

OWASP Bucharest EEE

OWASP Bucharest is happy to announce the next local event, part of OWASP EEE (Eastern European Event), a one day Security and Hacking Conference. It will take place on 9th of October, 2015 – Bucharest,...

View Article


Image may be NSFW.
Clik here to view.

Introduction to Windows shellcode development – Part 1

This article contains an overview of shellcode development techniques and their specific aspects. Understanding these concepts allows you to write your own shellcode. Furthermore, you could modify...

View Article

Image may be NSFW.
Clik here to view.

Introduction to Windows shellcode development – Part 2

If you missed the first part of this series, where you can read about what is a shellcode and how it works, you can find it here: Part I. In this part, I will cover required information in order to be…...

View Article

Image may be NSFW.
Clik here to view.

Introduction to Windows shellcode development – Part 3

 If you missed the first two parts of this article, you can find in Part I what is a shellcode, how it works and which are its limitations and in Part II you can read about the PEB (Process...

View Article

Browsing all 8 articles
Browse latest View live




Latest Images