What does a cult Brezhnev-era movie have to do with how exploit code finds its bearings in a Windows process’ address space? How can cryptographically insecure hashing functions be exploited to create honeypots that thwart shellcode? We researched this as a part of our Halting Attacks Via Obstructing Configurations project, funded by DARPA Cyber Fast Track. You can read about it in the International Journal of PoC||GTFO, issue 0x12, or browse our mirror at https://digitaloperatives.com/pocorgtfo.
Recent Posts
- Defeating Cisco’s Machine Learning Based Malware Traffic Detection Algorithm
- The Cyber-Insecurity of WeWork – Shared Offices and Cracking WiFi with Weak WPA2 Passwords
- Idea Machine – Part 1: Automated Reconnaissance For Penetration Testing
- Target Audiences In Cyber Security
- (Automated) Vulnerability Analysis is Hard