+

Tagged With / 'buffer overflow'



July 23, 2013

Magazine News Redaction Comments Off

Advanced Windows Exploitation – Read Hakin9′s Tutorials and Get Professional IT Security Skills!

Dear Readers, We are happy to introduce our new issue of Hakin9 on Demand. We are still in exploitation area, but this time we explore Advanced Windows Exploitation. Windows is the most known operation system in the world. First version of Windows was developed in 1985 by Microsoft Corporation, and until today new version appear. […]

Read more


July 2, 2013

Magazine News Redaction Comments Off

Learn Software Exploitation Techniques Step-by-step And Become A Hacker – A Beginners’ Guide to Software Exploitation

Dear readers, We are happy to present you with the third edition of Starter-Kit Project. We continue supplying you with the articles on the basics of hacking and exploiting. Although we realeased StarterKit Compendium (can be found here: https://hakin9.org/ exploiting-for-beginners-exploiting-software-compendium/) only two weeks ago, we decided to go on with the topic and provide you […]

Read more


June 19, 2013

Magazine News Redaction Comments Off

Exploiting for Beginners – Exploiting Software Compendium

Dear Readers, We are happy to supply you with second publication devoted to those of you who want to learn some basic hacking skills. Let us present Hakin9 StarterKit – Exploiting Software Compendium. This publication encloses basic articles on exploiting software that were published in our magazine this and last year. The articles address various […]

Read more


October 24, 2011

Magazine Redaction 46 Comments

Exploiting Software 02/11 Exploit format Strings with Python

Cracking Java Applications Using AOP Exploits (part 2) By Daniel Drozdzewski AOP has been used in the domain of Software Security before. Its use was mainly for validation, auditing and authorization purposes, which in turn improve software security as a whole. Those crosscutting concerns are being woven into the existing software after the fully functional […]

Read more


September 23, 2011

Magazine Redaction No Comments

Exploiting Software 1/2011

CONTENT: Cracking Java Applications Using AOP exploits (part 1) By Daniel Drozdzewski Aspect Oriented Programming is a paradigm that aims to modularise software further by the separation of crosscutting concerns. Daniel will show us the basics of AOP and a simple, yet powerful idea behind the exploit. Smashing the Stack By Mariano Graxziano and Marco […]

Read more

June 15, 2011

Articles Redaction No Comments

Ask the Social Engineer: Exploitation of the Human OS – The Human Buffer Overflow

Total domination is the goal for a penetration tester in every pentest – To utterly hack the company and demonstrate their true exposure to malicious attacks. Obtaining code execution is the easiest and most direct way to reach this goal. Social Engineering professionals are no different. by Chris Hadnagy Comments

Read more

June 15, 2011

Articles Redaction No Comments

From Fuzz To Sploit

By now everyone has heard of buffer overflows and a lot have been hearing about it for the last 15+ years. Through this time period there have been many techniques evolved both to combat vulnerabilities as well as persist attack and exploitation. As security is most often most thought of as an afterthought it is […]

Read more


June 15, 2011

Magazine Redaction 3 Comments

Hakin9 Extra 1/2011 – Exploiting Software

Ask the Social Engineer: Exploitation of the Human OS – The Human Buffer Overflow by Chris Hadnagy Total domination is the goal for a penetration tester in every pentest – To utterly hack the company and demonstrate their true exposure to malicious attacks. Obtaining code execution is the easiest and most direct way to reach […]

Read more

August 1, 2010

Articles Redaction No Comments

Mobile Malware – the new cyber threat – An analysis of the potential malware threat to mobiles

Mobile phone malware first appeared in June 2004 and it was called Cabir. The mobile-phone features at most risk are text messaging (using social engineering), contacts list, video and buffer overflows. GSM, GPS, Bluetooth, MMS and SMS will indeed be some of the attack vector to expect this year and beyond. Author: JULIAN EVANS Source: […]

Read more

December 1, 2009

Articles Redaction No Comments

About Software Exploitation & Malwares

These days, software is everywhere and in almost all fields (for personal or professional use). Exploiting software can be ascribed to various security problems from buffer overflow to virii. How are we to be able to know that a program is not as protected as the author wants to make us believe? And what can […]

Read more

June 1, 2009

Articles Redaction No Comments

Anatomy of Malicious PDF Documents, Part 2

What tools do you need to analyze a malicious PDF document? You could use Acrobat, but then you run the risk of infecting your machine when opening the PDF document with Acrobat. Author: DIDIER STEVENS Source: Hakin9 6/2009 https://hakin9.org WHAT YOU WILL LEARN… Analyzing malicious PDF documents with custom tools WHAT SHOULD YOU KNOW… The structure of PDF […]

Read more

March 1, 2009

Articles Redaction No Comments

A New Era for Buffer Overflow

This article describes a few modern techniques for buffer overflow exploitation. There are just as many ways to prevent BOF with defensive mechanisms as there are ways to bypass those defenses. Author: JUSTIN SUNWOO KIM Source: Hakin9 3/2009 https://hakin9.org However, my purpose for writing this article is to the awareness of security and in the hopes of better […]

Read more

IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa