Corelan - corelan.be - Corelan Team

Latest News:

Corelan Logo Contest – The submissions 30 Jul 2013 | 01:00 am

Hi all,   As announced a couple of weeks ago, the Corelan Logo contest is now closed, which means we are no longer accepting new submissions. 3 people have submitted one or more designs: Design 1   De...

Corelan Logo contest – Derbycon 2013 5 Jul 2013 | 01:03 am

For the third year in a row, I’ll be teaching the Corelan Exploit Dev Bootcamp at Derbycon.  If you were able to grab a ticket to the course, you can expect a true bootcamp-style, very hands-on course...

Root Cause Analysis – Integer Overflows 2 Jul 2013 | 06:00 pm

Foreword Over the past few years, Corelan Team has received many exploit related questions, including “I have found a bug and I don’t seem to control EIP, what can I do ?”; “Can you write a tutorial o...

BlackHatEU2013 – Day2 – DropSmack: How cloud synchronization services render your corporate firewall worthless 15 Mar 2013 | 08:57 pm

Jake Williams (@malwareJake) from CSR Group has more than a decade of experience with systems engineering, network defines, malware reverse engineering, penetration testing and forensics. He spent som...

BlackHatEU2013 – Day2 – Advanced Heap Manipulation in Windows 8 15 Mar 2013 | 06:44 pm

Good afternoon everyone, The next talk I will be covering today is presented by Zhenhua ‘Eric’ Liu, Senior Security researcher at Fortinet. Why doing this type of research. Facts : Exploiting memory c...

BlackHatEU2013 – Day2 – Who’s really attacking your ICS devices ? 15 Mar 2013 | 03:18 pm

Kyle Wilhoit, Threat researcher at Trend Micro, explains that he will provide an overview of ICS systems before looking at some interesting attacks at ICS systems. Concerns/Overview of ICS Security an...

BlackHatEU2013 – Day2 – The Sandbox Roulette: Are you ready to ramble 15 Mar 2013 | 01:53 pm

Good morning friends, I’d like to welcome you back on this second day of BlackHat Europe 2013.  Day 1 has been pretty interesting, so let’s see how day 2 goes (especially after Rapid7 and IOActive par...

BlackHatEU2013 – Day 1 – To dock or not to dock 14 Mar 2013 | 08:50 pm

Time flies !  After hanging out with @repmovsb and @botherder, it’s time for the last talk of the day.  In the “To dock or not to dock, that is the question” talk, Andy Davis, research director at NCC...

BlackHatEU2013 – Day1 – Hardening Windows 8 Apps for the Windows Store 14 Mar 2013 | 06:29 pm

The first talk after having lunch at BlackHat Europe 2013, title “Hardening Windows 8 Apps for the Windows Store” is delivered by Bill Sempf (@sempf). Usually, the first slot after lunch is not really...

BlackHatEU2013 – Day1 – Hacking Appliances 14 Mar 2013 | 04:16 pm

The second talk I’m attending today is presented by Ben Williams, who’s going to talk about “Ironic exploitation of security products”. He explains that, as a pentester/researcher for NCC Group, he ge...

Related Keywords:

immunity debugger, awk, backtrack wpa2, corelan, corelan.be, cracking wpa with backtrack 4, backtrack 4 wpa, adding administrator to all staff permission list, kernel sources backtrack, immunity livebin

Recently parsed news:

Recent searches: