Quantcast
Channel: MalwareTech
Browsing all 139 articles
Browse latest View live
↧

Everything you need to know about the OpenSSL 3.0.7 Patch (CVE-2022-3602 &...

Vulnerability Details From https://www.openssl.org/news/secadv/20221101.txt X.509 Email Address 4-byte Buffer Overflow (CVE-2022-3602) ==========================================================...

View Article


Analysis of a VB Script Heap Overflow (CVE-2019-0666)

View Article


Analysis of CVE-2019-0708 (BlueKeep)

View Article

YouTube’s Policy on Hacking Tutorials is Problematic

View Article

DejaBlue: Analyzing a RDP Heap Overflow

View Article


BlueKeep: A Journey from DoS to RCE (CVE-2019-0708)

View Article

How I Found My First Ever ZeroDay (In RDP)

View Article

An in-depth look at hacking back, active defense, and cyber letters of marque

View Article


[Video] Exploiting Windows RPC – CVE-2022-26809 Explained | Patch Analysis

View Article


[Video] Introduction to Use-After-Free Vulnerabilities | UserAfterFree...

View Article

Everything you need to know about the OpenSSL 3.0.7 Patch (CVE-2022-3602...

View Article

TikTok is a National Security Risk, Not A Privacy One

An analysis of the threat posed by TikTok and why we need to weigh our options carefully.

View Article

A Realistic Look at Implications of ChatGPT for Cybercrime

Analyzing ChatGPT's capabilities and various claims about how it will revolutionize cybercrime.

View Article


It might Be Time to Rethink Phishing Awareness

Phishing awareness can be a powerful security tool, or a complete disaster. It all hinges on how you implement it.

View Article

An Introduction to Bypassing User Mode EDR Hooks

Understanding the basics of user mode EDR hooking, common bypass techniques, and their limitations.

View Article


Silly EDR Bypasses and Where To Find Them

Abusing exception handlers to hook and bypass user mode EDR hooks.

View Article

Bypassing EDRs With EDR-Preloading

Evading user mode EDR hooks by hijacking the AppVerifier layer

View Article


CVE-2024-38063 - Remotely Exploiting The Kernel Via IPv6

Performing a root cause analysis & building proof-of-concept for CVE-2024-38063, a CVSS 9.8 Vulnerability In the Windows Kernel IPv6 Parser

View Article

The US Needs A New Cybersecurity Strategy: More Offensive Cyber Operations...

For a long time Chinese hackers have been operating in the grey area between espionage and warfare. The US has been struggling to defend its networks, but increasing offensive cyber operations in...

View Article
Browsing all 139 articles
Browse latest View live