Quantcast
Channel: Open Security Research
Browsing all 107 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Writing Slack Space on Windows

By Diego Urquiza. I’m a Foundstone intern in NYC office and for a project I decided to write a tool to remove file slack space. In this post I’ll introduce the methods I took in writing the tool then...

View Article


Image may be NSFW.
Clik here to view.

KLEE on Ubuntu 14.04 LTS 64Bit

by Brad Antoniewicz. It seems like all of the cool kids nowadays are into Symbolic Execution, especially for vulnerability research. It's probably all because of DARPA's Cyber Grand Challenge - a...

View Article


Image may be NSFW.
Clik here to view.

Learning Exploitation with FSExploitMe

By Brad Antoniewicz. I've been an adjunct professor at NYU Poly for almost two years now. It's been a great experience for a number of reasons, one of which is because I'm teaching a hot topic:...

View Article

Image may be NSFW.
Clik here to view.

My Cousin VIMmy: A Journey Into the Power of VIM

By Melissa Augustine Goldsmith. I was cleaning up some YARA rules we have in the office. I am, if anything, a bit OCD about tabs and spacing. I came across this rule from Contagio Exploit pack......

View Article

Image may be NSFW.
Clik here to view.

Face Smack: A CSAW CTF Challenge

By Brad Antoniewicz. For the last couple of years, I've had the pleasure to help out with and judge NYU Poly CSAW's CTF, the largest student-run Capture the Flag competition is the United States...

View Article


Image may be NSFW.
Clik here to view.

hostapd-wpe: Now with More Pwnage!

By Brad Antoniewicz. A major component of hacking IEEE 802.11 wireless networks is targeting the client's system. This is because of the trusting nature of wireless and corporate systems can be tricky...

View Article

Image may be NSFW.
Clik here to view.

A Brief Overview of the Google Authenticator

By Deepak Choudhary. Many application providers are considering implementing a more robust login mechanism to their applications as single layer authentication is no longer considered a secure...

View Article
Browsing all 107 articles
Browse latest View live