Research
Adversary Levels
1. Level 1 – Common Adversary: This level of adversary is the lowest level tier. Most adversaries at this level are...
ASX to MP3 Converter Buffer Overflow with DEP Bypass – ROP Chains
First we can use mona.py to identify gadgets and compute potential rop chains..<snip>..Check mona’s output...
ASX to MP3 Converter Buffer Overflow
Upon opening the provided exploit file, fuzzing.asx in Notepad++ it’s clear there is some sort of file formatting...
Bug Bounty
There are countless resources out there on participating in Bug Bounty programs from a researcher's perspective....
Launch an Engagement
So you want to launch an engagement at your organization to simply…find vulnerabilities but you have many questions,...
Levels of Red Teaming
1. Technical Assessment (Generic Adversary Model): Focus is on technology without an adversary model. Examples include...