Products
Overview
Advantages
Technology
Return On Investment
Preventable Data Breaches
Request More Information
Industries
Applicable Industry Verticals
Services
Vulnerability Research
Infrastructure Security
Software Development
Company
About Us
Investors
Partners
News
Technical Blog
Careers
Request More Information
Contact Us
Month: June 2014
2014/06/30
Destroying ROP gadgets with Inline code
Search
Search for:
Search
Recent Posts
A New Category of Data Protection Product: Data Breach Prevention
A1Logic
ShellShock: Vulnerability, Patch and Exploit Analysis
Destroying ROP gadgets with Inline code
VTGuard
Labels
Active Directory
,
Debugging
,
Exploit Mitigations
,
Forensics
,
Hack
,
Hardware
,
Linux
,
Networking
,
Powershell
,
ShellShock
,
Software Attack Vectors
,
Software Exploitation Techniques
,
Stuxnet
,
Virtual Box
,
Windows
Blog Archive
►
2018 (1)
►
April (1)
A New Category of Data Protection Product: Data Breach Prevention
►
2014 (5)
►
October (1)
A1Logic
►
September (1)
ShellShock: Vulnerability, Patch and Exploit Analysis
►
June (1)
Destroying ROP gadgets with Inline code
►
April (1)
VTGuard
►
February (1)
Page Heap
►
2013 (5)
►
November (1)
Visual Heap Spray
►
October (1)
Low Fragmentation Heap ReAllocation for Use After Free Exploitation
►
June (1)
Heap Debugging Tricks
►
April (1)
ROP (Return Oriented Programming)
►
February (1)
Attacking V-Table Pointers
►
2012 (10)
►
December (2)
Nullcon New Delhi 2012 and DefCon 21 Presentations:
Windows 8 Kernel Debugging
►
October (2)
Single Step Debugging Explained
Securely Wiping Computer Hard Disks for Free
►
June (2)
Stack Pivoting
Disable DEP and ASLR on Windows 7 64bit at compile time
►
May (1)
Hardware vs Software Breakpoints
►
April (1)
Software Attack Vectors: Format String Vulnerability
►
February (1)
FastIO
►
January (1)
Software Attack Vectors: Stack Based Buffer Overflow
►
2011 (19)
►
October (1)
Disassembly Algorithms
►
September (2)
Reversing Stuxnet: 5 (Kernel Hooking)
PE File Format
►
August (3)
Reversing Stuxnet: 4 (File Filtering Rules)
Reversing Stuxnet: 3 (Filesystem hooking)
Reversing Stuxnet: 2 (Breaking into Mrxnet.sys)
►
June (1)
Reversing Stuxnet: 1
►
May (3)
What is Stuxnet?
VirtualBox kernel debugging a Windows XP Guest
Powershell
►
March (9)
x86 architecture specifics
TCP Port Scanning
General Linux notes
Gentoo Linux Notes
Active Directory FSMO roles
TrustedInstaller
TCP 3 Way Handshake
VirtualBox
Installing Windows 7 on a USB drive
WordPress Lightbox
Products
Overview
Advantages
Technology
Return On Investment
Preventable Data Breaches
Request More Information
Industries
Applicable Industry Verticals
Services
Vulnerability Research
Infrastructure Security
Software Development
Company
About Us
Investors
Partners
News
Technical Blog
Careers
Request More Information
Contact Us