In this post we will talk about how one of the oldest computer attacks occurs: buffer overflow. A buffer overflow occurs when a program has…
Posts published in “PoC’s”
In this post I am going to make a proof of concept about how to make a CTF of a machine. This post is going…
A few days ago I read an article by Leon Juranic that discovered a new world of possibilities for me. The article is called “Back…
We all know them. They plague our computers. But how are viruses made? In general, talking about creating malware is rare in the area of…
Metasploit is an open source project created by H.D Moore that facilitates the exploitation of security vulnerabilities in intrusion tests. It is divided into modules…