top of page
Search
Erica Zelickowski
Jul 25, 20235 min read
Playing with Bubbles: An Introduction to DLL-Sideloading
DLL Side-Loading is a pervasive technique partially because its behavior is difficult to detect. As a sub-technique of DLL Hijacking, it ta
Nihaal Prasad
Oct 5, 20216 min read
Return to Libc: Linux Exploit Development
This blog post will cover how to conduct a ret2libc attack. The ret2libc technique is a tactic used in Linux exploit development that allows
Mattia Campagnano
May 20, 20207 min read
Weaponizing Windows Binaries and Scripts (LOLBAS): What's Old Is New Again
One of the latest trends in penetration testing and malware development is to weaponize the so-called Living Off the Land Binaries and Scrip
Wade Ma
Mar 3, 20209 min read
Automated Obfuscation of Windows Malware and Exploits Using O-LLVM
Today’s malware authors and exploit developers have automated methods of obfuscating their software, When these techniques are combined with
Mattia Campagnano
Feb 3, 20209 min read
Ransomware Attacks Are on the Rise, Should You Pay the Ransom?
However, sometimes the answer to this question cannot be so clear-cut. Much depends on how valuable the information being held for ransom is
Fred Mastrippolito
Jun 18, 20192 min read
The CISO asked me to run Ransomware on his laptop
The executive’s laptop had the very latest version of a cloud-based, next-generation antivirus endpoint detection and response software, whi
Ben Hughes
Jan 4, 20185 min read
Meltdown and Spectre: Quick Overview and Next Steps
The purpose of this blog post is not to provide an exhaustive overview of Meltdown and Spectre, but instead to provide key points and caveat
Ian Duffy
Mar 15, 20164 min read
Language Interpreters and Post-Exploitation
*This blog entry was originally published on March 15, 2016 on the original Polito Blog by Ian Duffy . It was re-posted on October 3,...
Ian Duffy
Mar 23, 20153 min read
Running Metasploit Shellcode in a Process
*This blog entry was originally published on March 23, 2015 on the original Polito Blog by Ian Duffy . It was re-posted on October 2,...
bottom of page