Hey ho, it’s time for some low-level shellcode encoding. After going through the encoder examples of the SLAE material I [...]
Ready for the next level? – Method to exploit software even with small space for shellcode: EggHunting The third task [...]
Welcome back to my second post for the SLAE certification. Today we are going to build a reverse_shell shellcode and [...]
After gaining my OSCP in June I decided to go deeper into exploitDev and shellcoding. And here we are, this [...]
Every day, millions of people become victims of cybercrime. These are usually not targeted by professional hackers, but fall victim [...]
Today I would like to share my experience with OSCP from the guys at Offensive Security. Why OSCP? There are [...]
UK – German Cyber-Security Forum On 26.07.2017, the second Cyber-Security Forum of the British Consulate and the Munich Security Network [...]
Almost every day, users become victims of so-called phishing emails. Therefore, in this short post, I would like to point [...]
“Who owns my data?” On 29.06.2017, a series of lectures on the above topic was held at the entrepreneurial [...]
We are safe because we have a virus scanner and a firewall! This statement is often the first to fall [...]