Blog

From 21.11. The SECUTA Information Security Conference will take place in Garmisch-Partenkirchen from November 1 to 23, 2018.  There, the [...]

18. May 2018

This is just another very short usage guide for one of my little helper for pentesters and the like. During [...]

30. April 2018

This is a short usage guide which should explain my simple wrapper for the spike fuzzer, which you can find [...]

6. March 2018

  Vulnerable software FTP server 8.0f(g) Vulnerability Local Buffer Overflow (SEH protected)-> Code Execution Time Line 01/24/2018 Vendor informed 01/30/2018 [...]

20. February 2018

As promised on Twitter here is my OSCE review. You can read my time line from before course enrolling until [...]

20. February 2018

While doing my preperation for the OSCE i found an exploit for the coolpalyer+ version 2.19.1 from 2009. I decided to [...]

19. February 2018

On 27.02.2018 between 1 and 4 p.m., the Munich Chamber of Commerce and Industry is offering a roundtable discussion for [...]

7. February 2018

The tiresome topic of passwords and their management. I am always asked how to solve this problem. Therefore, I decided [...]

8. January 2018

The last post for my SLAE certification is about encryption of shellcode. As usual you can find all my files [...]

23. November 2017

This task (pick up 3 shellcodes from Shell-Storm and use polymorphism to beat pattern matching) sounds really sophisticated but you [...]

10. October 2017