SecTemple: hacking, threat hunting, pentesting y Ciberseguridad
▼
Showing posts with label Binary Exploitation. Show all posts
Showing posts with label Binary Exploitation. Show all posts

Anatomy of KASAN on Windows: A Deep Dive into Binary Exploitation and ROP Shuffling

›
The digital fortress is under constant siege. Not from brute force, but from whispers within the code, subtle misalignments in logic that,...

Anatomy of the OpenSSL "Punycode" Vulnerability (CVE-2022-3602) and Its Defense

›
The digital realm hums with a constant, low-frequency thrum of vulnerabilities waiting to be discovered, exploited, or, if we're lucky...

Anatomy of a SHA-3 Overflow: Mitigating Exploits in Cryptographic Libraries

›
The digital fortress is under constant siege. While the headlines blare about massive data breaches, the insidious threats often lurk in t...

i.MX Secure Boot Bypass and Hancom Office Underflow: A Defensive Deep Dive

›
The digital realm is a battlefield, and even the most robust defenses can have chinks in their armor. This week, we're dissecting two...

Fuchsia OS, Printer Bugs, and Radare2 Hacking: A Deep Dive into Binary Exploitation

›
Hello and welcome to the temple of cybersecurity. You're about to dive into an analysis of key topics in binary exploitation and secu...

Pwn2Own, Parallels Desktop, and an AppleAVD Bug: A Deep Dive into Exploitation and Defense

›
The digital underbelly is a murky place, full of whispers about zero-days and the scent of exploited systems. This week, the shadows are c...
›
Home
View web version
Powered by Blogger.