Photo by Joanna Kosinska on Unsplash

Cybersecurity as Strategy

Strategize with cybersecurity and avoid losses

A recently published article calls to elevate cybersecurity from operational to a strategic...

Photo by Charles Deluvio on Unsplash

"No, We Won't Get Hacked!"

And, "of course, I can always protect my company."

In cybersecurity, optimism bias and overconfidence can have pervasive consequences. I discuss...

Photo by Cookie the Pom on Unsplash

My Favorite Password: '123456'

You could be a victim of Credential Stuffing

I wrote this post to give you an overview of the Credential Stuffing attack and some short...

Photo by Christina @ on Unsplash

HEVD: Local Privilege Escalation

Local Privilege Escalation

In this article we will be able to perform a Local Privilege Escalation using an exploit to HEVD

Photo by Michael Dziedzic on Unsplash


Bypassing OS protections

In this article we will defeat some protections using several techniques for exploting HackSys...

Photo by Chaozzy Lin on Unsplash

HEVD: Denial of Service

How to crash Windows

This article will be the first approach to start exploting HackSys Extremely Vulnerable Driver...

Photo by Wesley Caribe on Unsplash

Windows Kernel Exploitation: Lab

Getting in the deeps of the OS

This post will guide you to setup a lab environment for start exploiting Windows Kernel drivers

Photo by Clovis WOOD on Unsplash

A Recent OSCE in Our Team

A short interview with Andres Roldan

We spoke with Andres Roldan, our Offensive Team Leader, who recently obtained his OSCE...

Photo by Syed Ali on Unsplash

TRUN: Exploiting with ROP

Exploiting Vulnserver with ROP

This post will show how to create a complete, functional exploit creating a complex shellcode using ROP

Photo by Michael Dziedzic on Unsplash

Bypassing DEP with ROP

Running instructions by reference

This post will show how bypass the Data Execution Prevention security mechanism using...

Photo by Chris Panas on Unsplash

Understanding DEP

Let's protect the stack

This post will show how the Data Execution Prevention (DEP) security mechanism works and what...

Photo by Joshua Earle on Unsplash

A Journey to OSCE

A personal OSCE experience

This post will describe the journey that I took to earn the OSCE certification.

1 2 3 4 5 6 7 8 9 10 11 12 >

Copyright © 2020 Fluid Attacks, We hack your software. All rights reserved.

Service status - Terms of Use - Privacy Policy - Cookie Policy