Quantcast
Channel: Corelan Team
Browsing all 35 articles
Browse latest View live

Root Cause Analysis – Memory Corruption Vulnerabilities

Introduction For the past year or so I’ve spent a significant amount of time fuzzing various applications with the hopes of identifying exploitable crashes.  Early on in my research I quickly realized...

View Article



Black Hat Europe 2013 – Preview

  Hola dear friends, There’s only a few days left until Black Hat Europe 2013 opens its doors in the beautiful city of Amsterdam, the Netherlands.   Just like past years, I’ll be covering some of the...

View Article

BlackHatEU2013 – Day1 – Practical Attacks against MDM solutions

Good morning everyone, Welcome to BlackHat Europe 2013 !  As announced in my post a couple of days ago, I’ll try to post short write-ups about some of the talks right after the presentation has...

View Article

BlackHatEU2013 – Day1 – Hacking Appliances

The second talk I’m attending today is presented by Ben Williams, who’s going to talk about “Ironic exploitation of security products”. He explains that, as a pentester/researcher for NCC Group, he...

View Article

BlackHatEU2013 – Day1 – Hardening Windows 8 Apps for the Windows Store

The first talk after having lunch at BlackHat Europe 2013, title “Hardening Windows 8 Apps for the Windows Store” is delivered by Bill Sempf (@sempf). Usually, the first slot after lunch is not really...

View Article


BlackHatEU2013 – Day 1 – To dock or not to dock

Time flies !  After hanging out with @repmovsb and @botherder, it’s time for the last talk of the day.  In the “To dock or not to dock, that is the question” talk, Andy Davis, research director at NCC...

View Article

BlackHatEU2013 – Day2 – The Sandbox Roulette: Are you ready to ramble

Good morning friends, I’d like to welcome you back on this second day of BlackHat Europe 2013.  Day 1 has been pretty interesting, so let’s see how day 2 goes (especially after Rapid7 and IOActive...

View Article

BlackHatEU2013 – Day2 – Who’s really attacking your ICS devices ?

Kyle Wilhoit, Threat researcher at Trend Micro, explains that he will provide an overview of ICS systems before looking at some interesting attacks at ICS systems. Concerns/Overview of ICS Security and...

View Article


BlackHatEU2013 – Day2 – Advanced Heap Manipulation in Windows 8

Good afternoon everyone, The next talk I will be covering today is presented by Zhenhua ‘Eric’ Liu, Senior Security researcher at Fortinet. Why doing this type of research. Facts : Exploiting memory...

View Article


BlackHatEU2013 – Day2 – DropSmack: How cloud synchronization services render...

Jake Williams (@malwareJake) from CSR Group has more than a decade of experience with systems engineering, network defines, malware reverse engineering, penetration testing and forensics. He spent some...

View Article

Root Cause Analysis – Integer Overflows

Foreword Over the past few years, Corelan Team has received many exploit related questions, including "I have found a bug and I don’t seem to control EIP, what can I do ?"; "Can you write a tutorial on...

View Article

Corelan Logo contest – Derbycon 2013

For the third year in a row, I’ll be teaching the Corelan Exploit Dev Bootcamp at Derbycon.  If you were able to grab a ticket to the course, you can expect a true bootcamp-style, very hands-on course,...

View Article

Corelan Logo Contest – The submissions

Hi all,   As announced a couple of weeks ago, the Corelan Logo contest is now closed, which means we are no longer accepting new submissions. 3 people have submitted one or more designs: Design 1...

View Article


Zabbix SQL Injection/RCE – CVE-2013-5743

Introduction First off, please do not throw a tomato at me since this is not the typical Windows binary exploit article that is posted on Corelan! During a recent a penetration test, I encountered a...

View Article

Using DBI for solving Reverse Engineering 101 – Newbie Contest from...

Introduction Last weekend I had some time so I wanted to have a look at a reversing challenge which you can find here:...

View Article


A chain is only as strong as its weakest link – DNS Hijack Monitoring

It doesn’t really matter how much time your developers have spent writing secure code and how many layers of security you have implemented to protect your website from being hacked and defaced.  Recent...

View Article

Metasploit Meterpreter and NAT

Professional pentesters typically use a host that is connected directly to the internet, has a public IP address, and is not hindered by any firewalls or NAT devices to perform their audit. Hacking...

View Article


Corelan Team reply to false allegation made by Kaspersky

Hi, A few moments ago, I was informed about an article on www.securelist.com and the fact that Corelan Team was mentioned in that post.  Apparently a researcher at Kaspersky Labs found a piece of text...

View Article

Happy 5th Birthday Corelan Team

Introduction Corelan Team was founded in September of 2009. Over the last few years, the team has written and published numerous tutorials on exploit development.  We have created a series of tools and...

View Article

HITB2014AMS – Hack In The Box / Haxpo 2014 Amsterdam

Dear friends, I’m getting ready for a short trip to Amsterdam, to attend the 5th Hack In The Box conference tomorrow … and I’m “hashtag” excited about it. HITB Haxpo and HITB2014AMS feature and amazing...

View Article
Browsing all 35 articles
Browse latest View live




Latest Images