Become a Partner
Add OffSec to your list of training providers
Partner with usBlog
May 3, 2024
14 min read
In this blog post, we’ll introduce a new bypass technique designed to bypass AMSI without the VirtualProtect API and without changing memory protection.
Research & Tutorials
The following is an excerpt from our new module on the recent XZ Utils backdoor, CVE-2024-3094. On Mar 29, 2024, at 12:00PM ET, Andres Freund posted on the Openwall mailing list about a backdoor he discovered in the XZ Utils package. The backdoor targeted the OpenSSH binary, allowing remote code execution on impacted machines.
Apr 9, 2024
5 min read
Research & Tutorials
Mixed sentiment surrounds the application of AI in cybersecurity. Join us for an examination of where AI fits into our cybersecurity toolkits.
Feb 26, 2024
6 min read
Research & Tutorials
Explore the evolution of ransomware attacks, their impact, types, and learn robust defense strategies against this escalating cyber threat.
Dec 15, 2023
8 min read
Research & Tutorials
Learn how social engineering exploits human vulnerabilities through manipulation and deception. This guide covers different tactics cybercriminals use and key strategies to protect your organization.
Dec 8, 2023
7 min read
Research & Tutorials
Explore key strategies to safeguard against Advanced Persistent Threats (APTs), focusing on prevention, response, and recovery in cybersecurity.
Nov 28, 2023
7 min read
Research & Tutorials
OffSec’s Csaba Fitzl shares how he reverse-engineered the macOS auto-login process, including the walls he hit, and the times he resorted to trial-and-error approaches.
Sep 23, 2022
31 min read
Research & Tutorials
The CAN bus (Controller Area Network bus) is a central network that a vehicle communicates with its components. We can think of this in regard to the fact that the vehicle has many functions that operate via electrical signals. The car has door locks, a speedometer, a gas gauge, controls for the brakes, controls for the gas pedal, and many, MANY more.
Aug 1, 2022
21 min read
Research & Tutorials
We previously explored how Cross-Site Scripting (XSS) makes for an excellent topic to understand the reach and impact of hacking. In this post, we’ll improve on conceptual understanding and try to help non-technical folks understand one of the core issues of information security: the fundamental ambiguity of code and data.
Jul 12, 2022
9 min read
Research & Tutorials
TJ shows us how adversaries use macro weaponization techniques to abuse hidden functionalities contained in Office document properties.
Jun 30, 2022
9 min read
Research & Tutorials
OffSec’s Jeremy Miller helps cybersecurity professionals explain hacking to laypeople using the Cross-site Scripting (XSS) vulnerability.
Apr 26, 2022
1 min read
Research & Tutorials
Content developer Matteo Malvica walks us through IRQLs and how hardware interrupts can be abused.
Apr 11, 2022
Research & Tutorials
Explore our guided introduction to game hacking. Learn how data in memory can be manipulated to achieve results that are outside the normal program design.
Feb 23, 2022