Toxicity in the cybersecurity sector

Toxicity in the cybersecurity sector

Today I find it necessary to move away from the technical side of this website to an opinion piece. I have been in the cybersecurity sector for 5 years. Specifically, in offensive cyber security. I have been lucky enough to go straight into cybersecurity work, which is rare. The most common thing is to find … Read more

Post Explotation Backdooring I

Code Cave PE

A few months ago I was in a post-exploitation course taught by my ex colleagueOscarAkaElvis (creator of the tool to audit Airgeddon, which I recommend you try). I also want to warn that this is an advanced technique and you need to have basic knowledge of assembler and reversing. If you don’t have them, I … Read more

Zip Bombs III: Overlapping Bombs

Zip Bomb

In this last post of the zip bombs series, I’m going to tell you about a new method that has emerged in the last month: overlapping bombs. With this type of bombs has come to achieve the highest rate of decompression of all time: from 46 MB to 4.5 Petabytes. The idea This kind of … Read more

Zip Bombs II: Quine Bombs

Zip Bomb

In last week’s post I introduced the zip bombs and explained how to create a zip bomb using the recursion technique. I recommend that you take a look at it if you haven’t already done so.  In this new entry I’m going to introduce the Quine Bombs.  Quine Programs In computing, a “quine” program is … Read more

Zip Bomb I: Nested bombs

Zip Bomb

When a file is compressed, its size is reduced. It’s based on a simple principle: if you have a file with the text “aaaaaabbb”, which is 9 characters long, you could reduce the size by saving it as “6a3b”. Using this rudimentary algorithm, you can decompress the compressed file by multiplying the character that follows … Read more

DLL Hijacking

DLL Hijacking

Recently I am doing some very interesting Pentester Academy courses. Thanks to them I am learning a lot, since they deal with very particular topics with clear examples.  Today I am going to show you what I have learned about DLL Hijacking. A DLL is a library of dynamic links. There are two types of … Read more

Buffer Overflow

Buffer Overflow

In this post we will talk about how one of the oldest computer attacks occurs: buffer overflow. A buffer overflow occurs when a program has reserved an amount of memory X for a variable in the memory space, but at the time of assigning its value, the value has a size greater than X. What … Read more

Malware PoC: How to do a Trojan Horse

Malware PoC: How to do a Trojan Horse

We all know them. They plague our computers. But how are viruses made? In general, talking about creating malware is rare in the area of cybersecurity, because unless you are dedicated to stopping it, there is no ethical reason why you should know how to develop malware. Or is it?  After all, a hacker seeks … Read more