SecTemple: hacking, threat hunting, pentesting y Ciberseguridad
▼
Showing posts with label Buffer Overflow. Show all posts
Showing posts with label Buffer Overflow. Show all posts

Ping Vulnerability CVE-2022-23093: An In-Depth Defensive Analysis and Mitigation Strategy

›
The digital realm is a battlefield, a constant ebb and flow of attackers probing defenses and defenders scrambling to shore up the walls....

Anatomy of a SHA-3 Overflow: Mitigating Exploits in Cryptographic Libraries

›
The digital fortress is under constant siege. While the headlines blare about massive data breaches, the insidious threats often lurk in t...

DEF CON 30: Unveiling Mainframe Buffer Overflows - A Defensive Deep Dive

›
The hum of the server room, a perpetual lullaby for the systems that run the world. From your morning coffee purchase to the global financ...

CVE-2022-38392: Unraveling the 'Rhythm Nation' Vulnerability in LibreOffice

›
There are ghosts in the machine, whispers of corrupted data in the logs. Today, we're not patching a system; we're performing a di...

Anatomy of the Code Red Worm: A Post-Mortem for Modern Defenses

›
The digital realm is a graveyard of forgotten vulnerabilities and spectacular failures. One such specter that haunts the annals of cybersec...

Analyzing the Anatomy of a Python 3 Use-After-Free and a PS4/PS5 Kernel Heap Overflow: Defense Strategies and Bounty Hunting Insights

›
In the shadowy alleys of the digital realm, whispers of vulnerabilities echo. This week, we delve into the underbelly of code, dissecting ...
›
Home
View web version
Powered by Blogger.