Skip to content

Security Café

Security Research and Services

  • Things we do on a daily basis
    • Red Team (DORA/TIBER) exercises
    • Web Application Penetration Testing
    • Mobile Application Penetration Testing
    • Infrastructure Penetration Testing
    • Vulnerability Assessment
  • CVEs, Talks and Tools
  • Contact
  • About

Tag: development

Exploiting Timed Based RCE

February 28, 2017 Pobereznicenco Dan

In a recent penetration testing project we encountered a situation where in order to prove exploitability and possible damage we had to exfiltrate data from

Continue reading

Introduction to Windows shellcode development – Part 2

December 14, 2015 Ionut Popescu

If you missed the first part of this series, where you can read about what is a shellcode and how it works, you can find

Continue reading

Introduction to Windows shellcode development – Part 1

October 30, 2015 Ionut Popescu

This article contains an overview of shellcode development techniques and their specific aspects. Understanding these concepts allows you to write your own shellcode. Furthermore, you

Continue reading

Top Posts

  • AWS CloudQuarry: Digging for Secrets in Public AMIs
  • Mobile Pentesting 101: How to Install Split APKs
  • AWS ssm:SendCommand or network agnostic built-in RCE as root
  • Introduction to Windows shellcode development - Part 1
  • A Complete Kubernetes Config Review Methodology

Blog Stats

  • 552,954 hits

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 156 other subscribers

Categories

  • Active Directory (4)
  • Announcements (2)
  • C2 (1)
  • Cloud Security (12)
    • aws (9)
    • Azure (3)
    • Kubernetes (1)
  • Conferences (4)
  • Embedded systems security (3)
    • IoT Pentesting (2)
  • Ethical Hacking (18)
  • General security (13)
  • IT Security Assurance (1)
  • IT Security Audit (2)
  • Metasploit (1)
  • Misc (20)
    • Artificial Intelligence (1)
    • Code Review (1)
    • CVE (1)
  • Mobile security (12)
  • Network security (7)
  • Operating systems (2)
  • Penetration Testing (24)
  • Pentest techniques (31)
  • Research (3)
  • Web security (13)
  • Wireless security (1)
Blog at WordPress.com.
  • Subscribe Subscribed
    • Security Café
    • Join 156 other subscribers
    • Already have a WordPress.com account? Log in now.
    • Security Café
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...