A new article has been published on InfosecInstitute, where I talk about intercepting traffic sent from various applications on an Android phone. In the article we're first intercepting the HTTP traffic and later the also trying to intercept the HTTPS traffic. If you want to know more about it, visit the this URL.
You can also look at Penetration Testing course offered by InfosecInstitute.
This is a security blog written and maintained by Dejan Lukan (eleanor).
Tuesday, January 15, 2013
Pen Testing Domain Controllers
A new article has been published on InfosecInstitute, where I talk about domain controllers and how to pentest them. If you read the article you'll understand what a domain controller is and how to enumerate it in various ways. If you want to know more about it, visit the this URL.
You can also look at Penetration Testing course offered by InfosecInstitute.
You can also look at Penetration Testing course offered by InfosecInstitute.
Hello World: C, Assembly, Object File and Executable
A new article has been published on InfosecInstitute, where I talk about how a simple "Hello World" program can be compiled/assembled from C source code into assembly code and later into binary representation. If you want to know more about it, visit the this URL.
You can also look at Reverse Engineering course offered by InfosecInstitute.
You can also look at Reverse Engineering course offered by InfosecInstitute.
Yara – Rule-based malware detection and analysis
A new article has been published on InfosecInstitute, where I talk about Yara tool, which can be used to classify malware products. This tool proves invaluable if we have a lot of execuable malware samples and we would like to categorize them. If you want to know more about it, visit the this URL.
You can also look at Web App Pen Testing course offered by InfosecInstitute.
You can also look at Web App Pen Testing course offered by InfosecInstitute.
NMAP Scripting Engine and Categories
A new article has been published on InfosecInstitute, where I talk about Nmap Scripting engine. It presents the internals of nmap scripting engine and provides in depth knowledge about how to use it. If you want to know more about it, visit the this URL.
You can also look at Penetration Testing course offered by InfosecInstitute.
You can also look at Penetration Testing course offered by InfosecInstitute.
NMAP Scripting Example
A new article has been published on InfosecInstitute, where I talk about NMAP scripting example. If we want to quickly test for something, we can use nmap scripting engine, which is quite powerful. In the example we're writing an example that executes "OPTIONS / HTTP/1.0" on the HTTP web server to enumerate supported HTTP options. If you want to know more about it, visit the this URL.
You can also look at Penetration Testing course offered by InfosecInstitute.
You can also look at Penetration Testing course offered by InfosecInstitute.
IDA: Cross References / Xrefs
A new article has been published on InfosecInstitute, where I talk about various Ida cross references / Xrefs that is invaluable knowledge to have when reverse engineering. If you want to know more about it, visit the this URL.
You can also look at Advanced Reverse Engineering and Malware course offered by InfosecInstitute.
You can also look at Advanced Reverse Engineering and Malware course offered by InfosecInstitute.
IDA Functions
A new article has been published on InfosecInstitute, where I talk about various Ida functions. Having the knowledge presented in that article is beneficial for reverse engineering any software product. If you want to know more about it, visit the this URL.
You can also look at Advanced Reverse Engineering and Malware course offered by InfosecInstitute.
You can also look at Advanced Reverse Engineering and Malware course offered by InfosecInstitute.
IDA: Jumping, Searching and Comments
A new article has been published on InfosecInstitute, where I talk about various Ida features that can come in handy when analyzing malware in Ida Pro. If you want to know more about it, visit the this URL.
You can also look at Advanced Reverse Engineering and Malware course offered by InfosecInstitute.
You can also look at Advanced Reverse Engineering and Malware course offered by InfosecInstitute.
Subscribe to:
Posts (Atom)