A Native Application Subsytem backdoor
What is a Native Application?
What is a Native Application?
This is a follow-up article to Introducing Blueprint which was released to accompany our malware templating tool, Blueprint. The goal of this article is to p...
As discussed in our previous post, regarding Fairplay, during Red Team engagements a lot of focus is shifted into preserving and protecting the malware. Fair...
During Red Team engagements, one of the most important tasks is to protect the crown jewels of the operation. As soon as the payloads prepared by the Red Tea...
Story time, before getting to the write up. I played the pwnables of DEFCON Quals 2020, mainly because it’s very fun, and also because I wanted to see what t...
Let’s face the truth, debugging and pwning stripped ELFs is a tedious process. The lack of symbols means that we need to type a lot of addresses manually, wh...
Freaking finally. It was about time! The first technical security post around here, and to be honest, the first post in a long time. I won’t bore you with a ...