Articles
This is a hand-picked list of blog posts that belong together / are related to each other :
Active Directory
- Free tool : Find out where your AD Users are logged on into
- Free tool – PVE Active Directory Disable Users
Certificates
Cisco
- Cisco VoIP Phones – A Hackers Perspective
- Script to backup Cisco switches via telnet / tftp
- Free Tool – Cisco Ironport C350 Safelist / Blocklist merge utility
- Cisco switch IOS cheat sheet
Cons and Seminars
- BlackHatEU2013 – Day2 – DropSmack: How cloud synchronization services render your corporate firewall worthless
- BlackHatEU2013 – Day2 – Advanced Heap Manipulation in Windows 8
- BlackHatEU2013 – Day2 – Who’s really attacking your ICS devices ?
- BlackHatEU2013 – Day2 – The Sandbox Roulette: Are you ready to ramble
- BlackHatEU2013 – Day 1 – To dock or not to dock
- BlackHatEU2013 – Day1 – Hardening Windows 8 Apps for the Windows Store
- BlackHatEU2013 – Day1 – Hacking Appliances
- BlackHatEU2013 – Day1 – Practical Attacks against MDM solutions
- HITB2012AMS Day 2 – Ghost in the Allocator
- HITB2012AMS Day 2 – Attacking XML Processing
- HITB2012AMS Day 2 – Taint Analysis
- HITB2012AMS Day 2 – PostScript – Danger Ahead
- HITB2012AMS Day 1 – Window Shopping
- HITB2012AMS Day 1 – One Flew Over The Cuckoos Nest
- HITB2012AMS Day 1 – WinRT The Metro-politan Museum of Security
- HITB2012AMS Day 1 – Intro and Keynote
- Hack In The Box Amsterdam 2012 – Preview
- BlackHat EU 2012 – Day 3
- BlackHat EU 2012 – Day 2
- Corelan T-Shirt Contest – Derbycon 2011
- ROP your way into B-Sides Las Vegas 2011
- Honeynet Workshop 2011
- BlackHat Europe 2011 / Day 02
- BlackHat Europe 2011 / Day 01
- Blackhat Europe 2010 Barcelona – Day 10
- Blackhat Europe 2010 Barcelona – Day 01
Crypto
Development
- Jingle BOFs, Jingle ROPs, Sploiting all the things… with Mona v2 !!
- Starting to write Immunity Debugger PyCommands : my cheatsheet
MS Exchange
- Exchange 2007/2010 : Renaming attachments ‘on the fly’ – custom transport agent
- Free tool – Attachment filtering with Exchange 2007/2010 (custom transport agent)
- Free Tool – Exchange 2007 Outbound SMTP gateway redundancy
Exploit Writing Tutorials
- Windows 10 x86/wow64 Userland heap
- Root Cause Analysis – Integer Overflows
- DEPS – Precise Heap Spray on Firefox and IE10
- Heap Layout Visualization with mona.py and WinDBG
- Root Cause Analysis – Memory Corruption Vulnerabilities
- Jingle BOFs, Jingle ROPs, Sploiting all the things… with Mona v2 !!
- Debugging Fun – Putting a process to sleep()
- Exploit writing tutorial part 11 : Heap Spraying Demystified
- WoW64 Egghunter
- Universal DEP/ASLR bypass with msvcr71.dll and mona.py
- Hack Notes : Ropping eggs for breakfast
- Hack Notes : ROP retn+offset and impact on stack setup
- Exploit writing tutorial part 10 : Chaining DEP with ROP – the Rubik’s[TM] Cube
- Exploiting Ken Ward Zipper : Taking advantage of payload conversion
- Ken Ward Zipper exploit write-up on abysssec.com
- QuickZip exploit article part 2 released on OffSec Blog
- Exploit writing tutorial part 9 : Introduction to Win32 shellcoding
- Starting to write Immunity Debugger PyCommands : my cheatsheet
- Exploit writing tutorial part 8 : Win32 Egg Hunting
- Exploit writing tutorial part 7 : Unicode – from 0x00410041 to calc
- Exploit writing tutorial part 6 : Bypassing Stack Cookies, SafeSeh, SEHOP, HW DEP and ASLR
- Exploit writing tutorial part 5 : How debugger modules & plugins can speed up basic exploit development
- Exploit writing tutorial part 4 : From Exploit to Metasploit – The basics
- Exploit writing tutorial part 3b : SEH Based Exploits – just another example
- Exploit writing tutorial part 3 : SEH Based Exploits
- Exploit writing tutorial part 2 : Stack Based Overflows – jumping to shellcode
- Exploit writing tutorial part 1 : Stack Based Overflows
Exploits
- DEPS – Precise Heap Spray on Firefox and IE10
- Heap Layout Visualization with mona.py and WinDBG
- Root Cause Analysis – Memory Corruption Vulnerabilities
- Jingle BOFs, Jingle ROPs, Sploiting all the things… with Mona v2 !!
- Metasploit Bounty – the Good, the Bad and the Ugly
- Universal DEP/ASLR bypass with msvcr71.dll and mona.py
- Hack Notes : Ropping eggs for breakfast
- Hack Notes : ROP retn+offset and impact on stack setup
- The Honeypot Incident – How strong is your UF (Reversing FU)
- Death of an ftp client / Birth of Metasploit modules
- Exploit writing tutorial part 10 : Chaining DEP with ROP – the Rubik’s[TM] Cube
- Exploiting Ken Ward Zipper : Taking advantage of payload conversion
- Ken Ward Zipper exploit write-up on abysssec.com
- Exploit writing tutorial part 8 : Win32 Egg Hunting
- Exploit writing tutorial part 7 : Unicode – from 0x00410041 to calc
- Fuzzing with Metasploit : Simple FTP fuzzer
- Exploit writing tutorial part 6 : Bypassing Stack Cookies, SafeSeh, SEHOP, HW DEP and ASLR
- Exploit writing tutorial part 5 : How debugger modules & plugins can speed up basic exploit development
- Exploit writing tutorial part 4 : From Exploit to Metasploit – The basics
- Exploit writing tutorial part 3b : SEH Based Exploits – just another example
- Exploit writing tutorial part 3 : SEH Based Exploits
- Exploit writing tutorial part 2 : Stack Based Overflows – jumping to shellcode
- Exploit writing tutorial part 1 : Stack Based Overflows
Fuzzing
Linux and Unix
- Cheat sheet : Installing Snorby 2.2 with Apache2 and Suricata with Barnyard2 on Ubuntu 10.x
- Nessus/OpenVAS wrapper for ike-scan
Malware and Reversing
- Using DBI for solving Reverse Engineering 101 – Newbie Contest from eLearnSecurity
- Reversing 101 – Solving a protection scheme
- Debugging Fun – Putting a process to sleep()
- Many roads to IAT
- HITB 2011 CTF – Reversing Vectored Exception Handling (VEH)
- Honeynet Workshop 2011
- Codegate 2011 CTF – Binary200 – Anti Debugging Techniques Explained
- Anti-debugging tricks revealed – Defcon CTF Qualifications 2009: Bin300 Analysis
- The Honeypot Incident – How strong is your UF (Reversing FU)
mona
My Free Tools
- EncFSGui – GUI Wrapper around encfs for OSX
- Jingle BOFs, Jingle ROPs, Sploiting all the things… with Mona v2 !!
- Script to backup Cisco switches via telnet / tftp
- Fuzzing with Metasploit : Simple FTP fuzzer
- Free tool : Find out where your AD Users are logged on into
- Exchange 2007/2010 : Renaming attachments ‘on the fly’ – custom transport agent
- Free tool : Windows 2003/2008 Certificate Authority Certificate List Utility for pending requests and about-to-expire certificates
- Nessus/OpenVAS wrapper for ike-scan
- Monitoring your network with Powershell
- Free tool – PVE TCP Ping Utility – v1.0.0.1
- Free Tool – Cisco Ironport C350 Safelist / Blocklist merge utility
- Free tool – Attachment filtering with Exchange 2007/2010 (custom transport agent)
- Free Tool – Exchange 2007 Outbound SMTP gateway redundancy
- Free tool – PVE Active Directory Disable Users
Networking
- Cheat sheet : Installing Snorby 2.2 with Apache2 and Suricata with Barnyard2 on Ubuntu 10.x
- Script to backup Cisco switches via telnet / tftp
- Nessus/OpenVAS wrapper for ike-scan
- Monitoring your network with Powershell
- Free tool – PVE TCP Ping Utility – v1.0.0.1
- Free Tool – Cisco Ironport C350 Safelist / Blocklist merge utility
- Cisco switch IOS cheat sheet
- Free Tool – Exchange 2007 Outbound SMTP gateway redundancy
Pentesting
Powershell
Private
Root Cause Analysis
Scripts
- EncFSGui – GUI Wrapper around encfs for OSX
- Jingle BOFs, Jingle ROPs, Sploiting all the things… with Mona v2 !!
- Pastenum – Pastebin/pastie enumeration tool
- Starting to write Immunity Debugger PyCommands : my cheatsheet
- Backup & Restore Windows Server based Print Servers
- Script to backup Cisco switches via telnet / tftp
- Fuzzing with Metasploit : Simple FTP fuzzer
- Free tool : Find out where your AD Users are logged on into
001_Security
- EncFSGui – GUI Wrapper around encfs for OSX
- DEPS – Precise Heap Spray on Firefox and IE10
- Heap Layout Visualization with mona.py and WinDBG
- Debugging Fun – Putting a process to sleep()
- Exploit writing tutorial part 11 : Heap Spraying Demystified
- WoW64 Egghunter
- Metasploit Bounty – the Good, the Bad and the Ugly
- Universal DEP/ASLR bypass with msvcr71.dll and mona.py
- HITB 2011 CTF – Reversing Vectored Exception Handling (VEH)
- Honeynet Workshop 2011
- Pastenum – Pastebin/pastie enumeration tool
- BlackHat Europe 2011 / Day 02
- BlackHat Europe 2011 / Day 01
- Codegate 2011 CTF – Binary200 – Anti Debugging Techniques Explained
- Cheat sheet : Installing Snorby 2.2 with Apache2 and Suricata with Barnyard2 on Ubuntu 10.x
- Anti-debugging tricks revealed – Defcon CTF Qualifications 2009: Bin300 Analysis
- Hack Notes : ROP retn+offset and impact on stack setup
- The Honeypot Incident – How strong is your UF (Reversing FU)
- Death of an ftp client / Birth of Metasploit modules
- Cisco VoIP Phones – A Hackers Perspective
- WATOBO – the unofficial manual
- Exploit writing tutorial part 10 : Chaining DEP with ROP – the Rubik’s[TM] Cube
- Blackhat Europe 2010 Barcelona – Day 10
- Blackhat Europe 2010 Barcelona – Day 01
- Exploiting Ken Ward Zipper : Taking advantage of payload conversion
- Ken Ward Zipper exploit write-up on abysssec.com
- QuickZip exploit article part 2 released on OffSec Blog
- Exploit writing tutorial part 9 : Introduction to Win32 shellcoding
- Starting to write Immunity Debugger PyCommands : my cheatsheet
- Exploit writing tutorial part 8 : Win32 Egg Hunting
- Exploit writing tutorial part 7 : Unicode – from 0x00410041 to calc
- Fuzzing with Metasploit : Simple FTP fuzzer
- Exploit writing tutorial part 6 : Bypassing Stack Cookies, SafeSeh, SEHOP, HW DEP and ASLR
- Exploit writing tutorial part 5 : How debugger modules & plugins can speed up basic exploit development
- Exploit writing tutorial part 4 : From Exploit to Metasploit – The basics
- Exploit writing tutorial part 3b : SEH Based Exploits – just another example
- Exploit writing tutorial part 3 : SEH Based Exploits
- Exploit writing tutorial part 2 : Stack Based Overflows – jumping to shellcode
- Exploit writing tutorial part 1 : Stack Based Overflows
- Free tool : Find out where your AD Users are logged on into
- Free tool : Windows 2003/2008 Certificate Authority Certificate List Utility for pending requests and about-to-expire certificates
- Nessus/OpenVAS wrapper for ike-scan
- Free Tool – Cisco Ironport C350 Safelist / Blocklist merge utility
- Free tool – Attachment filtering with Exchange 2007/2010 (custom transport agent)
- Free tool – PVE Active Directory Disable Users
Papers
- Cheat sheet : Installing Snorby 2.2 with Apache2 and Suricata with Barnyard2 on Ubuntu 10.x
- Cisco VoIP Phones – A Hackers Perspective
- WATOBO – the unofficial manual
Tools
Uncategorized
- BlackHatEU2013 – Day2 – The Sandbox Roulette: Are you ready to ramble
- Debugging Fun – Putting a process to sleep()
- WoW64 Egghunter
- HITB 2011 CTF – Reversing Vectored Exception Handling (VEH)
- Honeynet Workshop 2011
Video
- Codegate 2011 CTF – Binary200 – Anti Debugging Techniques Explained
- Anti-debugging tricks revealed – Defcon CTF Qualifications 2009: Bin300 Analysis