-
Archives
- August 2024
- January 2024
- December 2023
- September 2023
- July 2023
- March 2023
- August 2022
- January 2022
- October 2021
- October 2020
- May 2020
- March 2020
- November 2018
- September 2017
- October 2016
- December 2015
- September 2015
- January 2015
- November 2014
- July 2014
- April 2014
- March 2014
- December 2013
- November 2013
- October 2013
- September 2013
- July 2013
- June 2013
- May 2013
- April 2013
- March 2013
- November 2012
- October 2012
- July 2012
- June 2012
- April 2012
- February 2012
- January 2012
- December 2011
- November 2011
- October 2011
- September 2011
- July 2011
- June 2011
- May 2011
- April 2011
- March 2011
- February 2011
- January 2011
- December 2010
- November 2010
- October 2010
- September 2010
- August 2010
- July 2010
- June 2010
- May 2010
- March 2010
- February 2010
- January 2010
- December 2009
- November 2009
-
Meta
Tag Archives: exploit
Book Review: PoC||GTFO
Yes, I’m back to blogging and doing a book review. I guess better late than never 🙂 This time I’m reviewing the holy hacker book: International Journal of Proof-of-Concept or Get The Fuck Out (PoC||GTFO, ISBN-13: 978-1-59327-880-9). The book sums … Continue reading
Posted in Books, Pentest, Privacy, Security, Technology
Tagged Book, exploit, Information Security, Penetration Testing, Poc||GTFO, Software Security
2 Comments
Race to 0day in Nation State Operating Systems
Operating System change is coming… We all know that Windows still dominates the desktop arena with Linux and MacOS trying to catch up and that Android dominates the mobile space with iOS and Windows Phone trying to catch up as … Continue reading
Posted in Privacy, Security, Technology
Tagged attack vector, Computer Network Operations (CNO), exploit, Intelligence, Software Security
Leave a comment
Book Review: iOS Hacker’s Handbook
I have been wanting to read this book for a long time, finally I managed to make time and I have to admit that it has exceeded my expectations. This magnificent work written by reputed experts in iOS, one of … Continue reading
Posted in Books, Pentest, Security, Technology
Tagged apple, Application Security, Book, exploit, Fuzzing, iOS, Penetration Testing, Reverse Engineering, Smartphone
Leave a comment
What’s the point of reporting 0day?
In the last weeks the news related to PRISM has not stopped since leaked by Edward Snowden, who worked for Booz Allen Hamilton, a defense contractor for the NSA. One interesting outcome of these leaks is the NSA access to … Continue reading
Network Intelligence Analysis
Analizar tráfico de red es realmente apasionante y para este post he pensado que serÃa un tema de interés para los lectores. El tráfico aquà analizado es más a modo de hobby cuando estoy en redes públicas/abiertas como hoteles, cafés … Continue reading
Infiltrate 2012 Report
[Español] El pasado 12 y 13 de enero tuvo lugar la segunda edición del congreso ofensivo Infiltrate organizada por ImmunitySec, en cuya primera edición ya estuvimos. A pesar que no todas las charlas fueron tan espectaculares como el año pasado … Continue reading
Reversing Android Crackmes for Fun
[Español] Hace tiempo que querÃa escribir sobre crackme en Android, ya que son un magnÃfico ejercicio para aprender técnicas de ingenierÃa inversa para Apps que luego podemos aplicar para analizar malware o buscar vulnerabilidades 😉 Para este post he pensado … Continue reading
Posted in Hacking, Pentest, Security, Technology
Tagged Android, Crackme, exploit, Information Security, malware, Penetration Testing, Reverse Engineering, Software Security
1 Comment
APT Article Published
[Español] Este mes la revista Red Seguridad incluye mi artÃculo sobre APT (Amenazas Persistentes Avanzadas) basado en mi experiencia personal en el trabajo donde hemos encontrado varias veces este tipo de amenazas. [English] This month the magazine Red Seguridad includes … Continue reading
Posted in Hacking, Pentest, Security
Tagged APT, attack vector, exploit, Information Security, malware, Penetration Testing
Leave a comment
Book Review Week: Hacking Exposed Malware & Rootkits
[Español] Este libro de la mÃtica serie Hacking Exposed está orientado al tema del malware y rootkits, en concreto su identificación y eliminación a lo largo de sus tres apartados, que se dividen en once capÃtulos y un estupendo apéndice. … Continue reading
Posted in Books, Hacking, Pentest, Security, Technology
Tagged attack vector, Book, exploit, Information Security, malware, Penetration Testing, Rootkits, Software Security
Leave a comment