All posts by Ola S

03

Mar'20

Gadgetinspector - A Byte Code Analyzer For Finding Deserialization Gadget Chains In Java Applications

This project inspects Java libraries and classpaths for gadget chains. Gadgets chains are used to construct exploits for deserialization vulnerabilities. …

Read More

27

Feb'20

Simple Remote Code Execution Vulnerability Examples for Beginners | by Ozgur Alp

Simple Remote Code Execution Vulnerability Examples for Beginners  Especially when I talk with newbie security researchers/bug bounty hunters, they always …

Read More

20

Feb'20

Dumping Firmware With the CH341a Programmer | by Rick Wisser 

Note: This blog will also be a lab for any of the upcoming Wild West Hackin’ Fest Conferences. During a …

Read More

13

Feb'20

How to hack "smasher2"​ on hackthebox.eu | by Davy Rogers

How to hack "smasher2"​ on hackthebox.eu  Introduction This was a frustrating and interesting challenge, there were parts of it that …

Read More

21

Jan'20

So, you want to try this 'hacking'​ stuff… | by Garry R

So, you want to try this 'hacking'​ stuff…  I've been presenting a lot lately. It's always nice to educate and …

Read More

20

Jan'20

Attack surfaces, tools and techniques cheat sheet | by SANS

https://github.com/The-Art-of-Hacking/h4cker/blob/master/cheat_sheets/Attack-Surfaces-Tools-and-Techniques.pdf

Read More

14

Jan'20

Blockchain for Business: How This Booming Technology is Benefiting Corporations| by the Rider University

Blockchain for Business: How This Booming Technology is Benefiting Corporations According to Deloitte’s 2018 survey of over 1,000 business executives, …

Read More

13

Jan'20

Covenant the .NET based C2 on Kali Linux | by Dan Dieterle

Covenant the .NET based C2 on Kali Linux There are many Command and Control Frameworks for Pentesters and Red Teamers …

Read More
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013