A memory corruption vulnerability (CVE-2021-4034) in PolKit, a component used in all major Linux distributions and in some Unix-like operating systems, has just appeared and…
Posts published in “PoC’s”
In the last few weeks there has been a revolution in the IT world. Everyone has been worried, there have been thousands of meetings to…
Two-step or multi-step authentication is a great enhancement to account security, but phishing attacks remain a danger.
Shodan is a search engine to find specific services such as webcams, SCADA systems, linksys… Its operation is simple but effective: it scans the whole…
Today I bring you a very interesting type of SQL Injection, and that is not very well known. It’s a variation of Blind SQL Injection.if…
This is the third post on the post-exploitation method based on code caves. In the first part I showed you how to create a basic…
This is the second part of the set of posts about Post Explotation Backdooring. If you haven’t read the previous post, I recommend you do…
In last week’s post I introduced the zip bombs and explained how to create a zip bomb using the recursion technique. I recommend that you…
When a file is compressed, its size is reduced. It’s based on a simple principle: if you have a file with the text “aaaaaabbb”, which…
After the posts about SQL Injection and NoSQL Injection, today I bring you the XSS Injection. This attack consists of injecting malicious code into benign…