Technical Analysis of ELF/Spylock.A Malware for GNU/Linux 7 Oct 2015 Nettitude recently obtained a sample of some malware intended to run on GNU/Linux-based servers, with the purpose... Read more
Malware manual unpacking - [custom + upx] 5 Oct 2015 Malware Manual Unpacking - [Custom + UPX] Read more
Malware Manual Unpacking - [Custom + UPX] 5 Oct 2015 Implementing all sort of methods to bypass anti-virus (AV) scanners and/or to make the analysis of a malware... Read more
Version Tracking in Ghidra 4 Oct 2015 When a binary is reverse engineered using Ghidra, various annotations are applied to aid in understanding the binary’s... Read more
Vulnerability discovered in unsupported Cisco Systems VPN Client 1 Oct 2015 An alternative, but no less accurate title to this article would be ‘why you shouldn’t stick with... Read more
CVE-2015-5227: zeropress and remote code execution in the Wordpress... 30 Sep 2015 CVE-2015-5227: Zeropress and Remote Code Execution in the Wordpress Landing Pages Plugin Read more
Rocktastic 23 Sep 2015 To a penetration tester, passwords are very interesting. They are often simple dictionary words and they can tell... Read more
Reducing The Attack Surface: A Human Error Perspective 9 Sep 2015 The efforts required for a successful cyber-attack do not match the efforts that are invested to build a... Read more
Cyber Fighting Power – Who Has The Upper Hand? 3 Sep 2015 Reading through the British Army Military Doctrine manual the other day (as you do!) the concept of Fighting Power in... Read more
Cyber fighting power - who has the upper hand? 3 Sep 2015 Cyber Fighting Power, Who Has The Upper Hand? Read more
Best seller New Price from Limited availability Course type Course length Dates and location x *PLEASE NOTE: Course is available in more countries, languages and dates*