Writing Slack Space on Windows
By Diego Urquiza. I’m a Foundstone intern in NYC office and for a project I decided to write a tool to remove file slack space. In this post I’ll introduce the methods I took in writing the tool then...
View ArticleKLEE on Ubuntu 14.04 LTS 64Bit
by Brad Antoniewicz. It seems like all of the cool kids nowadays are into Symbolic Execution, especially for vulnerability research. It's probably all because of DARPA's Cyber Grand Challenge - a...
View ArticleLearning Exploitation with FSExploitMe
By Brad Antoniewicz. I've been an adjunct professor at NYU Poly for almost two years now. It's been a great experience for a number of reasons, one of which is because I'm teaching a hot topic:...
View ArticleMy Cousin VIMmy: A Journey Into the Power of VIM
By Melissa Augustine Goldsmith. I was cleaning up some YARA rules we have in the office. I am, if anything, a bit OCD about tabs and spacing. I came across this rule from Contagio Exploit pack......
View ArticleFace Smack: A CSAW CTF Challenge
By Brad Antoniewicz. For the last couple of years, I've had the pleasure to help out with and judge NYU Poly CSAW's CTF, the largest student-run Capture the Flag competition is the United States...
View Articlehostapd-wpe: Now with More Pwnage!
By Brad Antoniewicz. A major component of hacking IEEE 802.11 wireless networks is targeting the client's system. This is because of the trusting nature of wireless and corporate systems can be tricky...
View ArticleA Brief Overview of the Google Authenticator
By Deepak Choudhary. Many application providers are considering implementing a more robust login mechanism to their applications as single layer authentication is no longer considered a secure...
View Article