Reliable Windows 7 Exploitation

February 28th, 2012|597 views Post Views

Introduction Reliable exploitation of browser vulnerabilities has been made increasingly difficult by introducing protection mechanisms such as DEP and ASLR.


Introduction to IDA Python

November 24th, 2011|634 views Post Views

Abstract IDAPython is an extension for IDA,the Interactive Disassembler.It brings the power and convenience of Python scripting to aid in


Top 10 iPhone Security Tips

November 23rd, 2011|601 views Post Views

This paper offers guidelines on securing your iPhone using features provided by iOS and by following other security best practices.It


Top 10 iPhone Security Tips

November 23rd, 2011|623 views Post Views

This paper offers guidelines on securing your iPhone using features provided by iOS and by following other security best practices.It


DNS poisoning via Port Exhaustion

October 18th, 2011|631 views Post Views

Watchfire released a very interesting whitepaper which describes a DNS poisoning attack against stub resolvers. It discloses two vulnerabilities: A





Back to Top ↑