Assembly Language Programming and Shellcoding – Important Functions – Part 1

Hi Everyone, I was away for so long and reason is as well “My Procrastination”. No matter how much I try to overcome this habit, I gets me all the … Continue reading “Assembly Language Programming and Shellcoding – Important Functions – Part 1”

Malware on Steroids – Part 2: Evading Antivirus in a Simulated Organizational Environment

In the previous post, we wrote a simple CMD Reverse Shell over TCP. However, in a real-life scenario, things would be pretty different. In this post, we will be focusing … Continue reading “Malware on Steroids – Part 2: Evading Antivirus in a Simulated Organizational Environment”

Malware on Steroids – Part 1: Simple CMD Reverse Shell

The Prologue If you haven’t watched the videos yet, here are my links to both the antivirus evasions I performed: 1. Windows Cloud ML Defender Evasion 2. Kaspersky AV Evasion … Continue reading “Malware on Steroids – Part 1: Simple CMD Reverse Shell”

Active Directory Penetration Dojo- Setup of AD Penetration Lab : Part 2

The Prologue Hi everyone, Welcome to the second part of the setup series on Pentest lab in AD environment. I hope your basic concepts about AD and Domain Controller are … Continue reading “Active Directory Penetration Dojo- Setup of AD Penetration Lab : Part 2”

Linux Buffer Overflows x86 Part -2 ( Overwriting and manipulating the RETURN address)

Hello Friends, this is the 2nd part of the Linux x86 Buffer Overflows. First of all I want to apologize for such a long delay after the First blog of … Continue reading “Linux Buffer Overflows x86 Part -2 ( Overwriting and manipulating the RETURN address)”

Ground Zero: Part 3-2 – Reverse Engineering – Patching Binaries with Radare2 – ARM64

In this post, we will explore a wonderful and powerful reverse engineering tool – Radare2, and see how we can patch binaries that we crack. In a previous post by … Continue reading “Ground Zero: Part 3-2 – Reverse Engineering – Patching Binaries with Radare2 – ARM64”

Ground Zero: Part 1-2 – Reverse Engineering Password Protected Reverse Shells – Linux x64

Prologue Its been a long time since I posted any of my blogs. What can I say, I was a bit busy with some of the office projects. But finally … Continue reading “Ground Zero: Part 1-2 – Reverse Engineering Password Protected Reverse Shells – Linux x64”

Assembly Language Programming and Shellcoding – Lab setup and some important things

Hi everyone, Considering delay in the previous post, I’m writing this post on fast-track. Very unusual for me 😛 Anyways, today we will be looking into lab setup first and … Continue reading “Assembly Language Programming and Shellcoding – Lab setup and some important things”

Microsoft PowerPoint’s Funny Read-only Protection Bypass

The Prologue @paranoidninja created a PPT file in Microsoft Windows PowerPoint 2016 for his presentation on Botnet Development at Defcon 9111. And decided to upload the file on our website … Continue reading “Microsoft PowerPoint’s Funny Read-only Protection Bypass”