Baby's first NX+ASLR bypass

DEFCON 22 CTF Qualifiers Writeup

Hi folks!

Read More

Defeating AES without a PhD

"Cryptography is typically bypassed, not penetrated." – Adi Shamir FAITH IN THE ARCANE When I tell ...

Read More

The Patsy Proxy: Getting others to do your dirty work

Patsy (slang) - A person easily taken advantage of, cheated, blamed, or ridiculed. My girlfriend ...

Read More

Too XXE For My Shirt

Until tonight, I'd never gotten a chance to try an xml external entity (XXE) attack. Earlier, I was ...

Read More

LIKE, omg!

If you read this blog, you might have seen my earlier post regarding my configurable SQL injection ...

Read More

On Null Byte Poisoning and XPath Injection

Recently I released a tool called XMLmao, a configurable testbed for learning to exploit XPath ...

Read More

Introducing SQLol

At the most recent Austin Hackers Association meeting I unveiled a project I've been working on for ...

Read More

My Other Ride is Your Image Upload Script(1)

Many security issues are based upon mistaken assumptions. For instance, when testing applications, ...

Read More

My Other Ride is Your Image Upload Script

Many security issues are based upon mistaken assumptions. For instance, when testing applications, ...

Read More