Photo by Barefoot Communications on Unsplash

Facebook Data Leak? Again?

About 533 million user phone numbers now for 'free'


This post outlines the most recent Facebook data leak with approximately 533 million records,...



Photo by Joshua Sukoff on Unsplash

What's in the FBI's 2020 Report?

Get a digest of Internet crime over the last year


This post gives you an overview of the FBI's 2020 Internet Crime Report, based on the activity...



Photo by Alejandro Luengo on Unsplash

Microsoft Exchange Server Hack

Hafnium exploits four zero-day vulnerabilities


This post describes the Microsoft Exchange Server hack that has affected multiple companies and...



Photo by Christopher Skor on Unsplash

Time for the U.S. to Strike Back?

SolarWinds could be the start of a U.S.-Russia cyberwar


Here you can find experts' opinions about the SolarWinds attack and some suggestions that could...



Photo by Shannon Litt on Unsplash

Sudo Heap Overflow CVE-2021-3156

Replicating CVE-2021-3156 with AFL


In this article we will be able to reproduce the bug described on CVE-2021-3156 using fuzzing.



Photo by Daniel Joshua on Unsplash

SolarWinds Supply Chain Attack

A concise summary of the SolarWinds security fiasco


This post outlines the SolarWinds supply chain attack that has affected multiple companies and...



Photo by Guido Hofmann on Unsplash

Babuk Locker for the 2021

The first ransomware (as a gift) for this new year


Here's a post dedicated to the new form of ransomware, Babuk Locker. I mention its encryption...



Photo by Christina @ wocintechchat.com on Unsplash

HEVD: Local Privilege Escalation

Local Privilege Escalation


In this article we will be able to perform a Local Privilege Escalation using an exploit to HEVD



Photo by Michael Dziedzic on Unsplash

HEVD: kASLR + SMEP Bypass

Bypassing OS protections


In this article we will defeat some protections using several techniques for exploting HackSys...



Photo by Chaozzy Lin on Unsplash

HEVD: Denial of Service

How to crash Windows


This article will be the first approach to start exploting HackSys Extremely Vulnerable Driver...



Photo by Wesley Caribe on Unsplash

Windows Kernel Exploitation: Lab

Getting in the deeps of the OS


This post will guide you to setup a lab environment for start exploiting Windows Kernel drivers



Photo by Syed Ali on Unsplash

TRUN: Exploiting with ROP

Exploiting Vulnserver with ROP


This post will show how to create a complete, functional exploit creating a complex shellcode using ROP




Service status - Terms of Use - Privacy Policy - Cookie Policy

Copyright © 2021 Fluid Attacks, We hack your software. All rights reserved.