Photo by Christina @ wocintechchat.com on Unsplash

HEVD: Local Privilege Escalation

Local Privilege Escalation


In this article we will be able to perform a Local Privilege Escalation using an exploit to HEVD



Photo by Michael Dziedzic on Unsplash

HEVD: kASLR + SMEP Bypass

Bypassing OS protections


In this article we will defeat some protections using several techniques for exploting HackSys...



Photo by Chaozzy Lin on Unsplash

HEVD: Denial of Service

How to crash Windows


This article will be the first approach to start exploting HackSys Extremely Vulnerable Driver...



Photo by Wesley Caribe on Unsplash

Windows Kernel Exploitation: Lab

Getting in the deeps of the OS


This post will guide you to setup a lab environment for start exploiting Windows Kernel drivers



Photo by Clovis WOOD on Unsplash

A Recent OSCE in Our Team

A short interview with Andres Roldan


We spoke with Andres Roldan, our Offensive Team Leader, who recently obtained his OSCE...



Photo by Syed Ali on Unsplash

TRUN: Exploiting with ROP

Exploiting Vulnserver with ROP


This post will show how to create a complete, functional exploit creating a complex shellcode using ROP



Photo by Michael Dziedzic on Unsplash

Bypassing DEP with ROP

Running instructions by reference


This post will show how bypass the Data Execution Prevention security mechanism using...



Photo by Chris Panas on Unsplash

Understanding DEP

Let's protect the stack


This post will show how the Data Execution Prevention (DEP) security mechanism works and what...



Photo by Joshua Earle on Unsplash

A Journey to OSCE

A personal OSCE experience


This post will describe the journey that I took to earn the OSCE certification.



Photo by James Pond on Unsplash

Schrems Trampled on the Shield

The EU-US Privacy Shield agreement is now invalid


This blog post might give you a better understanding of what has been achieved by Max Schrems...



Photo by Lucas Benjamin on Unsplash

Tribe of Hackers Red Team 1.0

Learning from the Red Team Expert Marcus J. Carey


This post is based on the book 'Tribe of Hackers Red Team' by Carey and Jin. Here we share an...



Photo by Keagan Henman on Unsplash

Exploiting MiTeC NetScanner

Tricky SEH exploit


This post will show how to build our version of an exploit for NetScanner 4.0.0.0, which was...




Service status - Terms of Use - Privacy Policy - Cookie Policy

Copyright © 2021 Fluid Attacks, We hack your software. All rights reserved.