Blog
Exploit Development
Oct 12, 2011
2 min read
Advanced Windows Exploitation Updated
Our Advanced Windows Exploitation (AWE) live course in Columbia, Maryland is fast approaching with a start-date of October 24. Not only is the first time we have offered this training outside of BlackHat, it is also the first time we are able to offer a full 5 days of training and a limited number of seats are still available for this intense course.
Exploit Development
Winamp 5.58 Exploit Development
The guys at the Exploit Database posted an awesome writeup on a Winamp 5.58 Exploit Development storming session – with some really cool results. In the end, they ended up writing a short assembly sequence to walk through the payload and replace bad characters with original shellcode bytes.
Oct 27, 2010
1 min read
Exploit Development
Adobe Shockwave player rcsL chunk memory corruption 0day
Adobe Shockwave player rcsL chunk memory corruption 0day demonstration and video
Oct 21, 2010
1 min read
Exploit Development
Evocam Remote Buffer Overflow on OSX
A tutorial on the Evocam Remote Buffer Overflow on OSX 10.5.8
Jun 4, 2010
10 min read
Exploit Development
Return Oriented Exploitation (ROP)
For all those who registered to AWE in BlackHat Vegas 2010 – we have special surprise for you… We’ve updated our “Bypassing NX” module with the buzzing ROP exploitation method.
Apr 12, 2010
3 min read
Exploit Development
QuickZip Stack BOF : A box of chocolates – part 2
QuickZip stack overflow walkthrough part 2
Mar 15, 2010
22 min read
Exploit Development
QuickZip Stack BOF 0day: a box of chocolates
QuickZip stack overflow walkthrough part 1
Mar 7, 2010
35 min read
Exploit Development
Multiple Media Player HTTP DataHandler Overflow
Multiple Media Player HTTP DataHandler Overflow submitted to Exploit-db.
Jan 15, 2010
2 min read
Exploit Development
Microsoft IIS FTP 5.0 Remote SYSTEM Exploit
Microsoft IIS FTP 5.0 remote SYSTEM exploit video demonstration
Aug 31, 2009
1 min read
Exploit Development
ITunes Reloaded – Getting the Shell
Exploiting iTunes, part 2
Jun 18, 2009
3 min read
Exploit Development
ITunes Exploitation Case Study
ITunes Exploitation Case Study
Jun 11, 2009
3 min read