Photo by Alejandro Luengo on Unsplash

Microsoft Exchange Server Hack

Hafnium exploits four zero-day vulnerabilities


This post describes the Microsoft Exchange Server hack that has affected multiple companies and...



Photo by Shannon Litt on Unsplash

Sudo Heap Overflow CVE-2021-3156

Replicating CVE-2021-3156 with AFL


In this article we will be able to reproduce the bug described on CVE-2021-3156 using fuzzing.



Photo by Daniel Joshua on Unsplash

SolarWinds Supply Chain Attack

A concise summary of the SolarWinds security fiasco


This post outlines the SolarWinds supply chain attack that has affected multiple companies and...



Person using a Syringe filled with bad stuff

Tainted Love

It's all about sanitization


This blog post provides a brief description of static and dynamic taint analysis or taint checking.



Depiction of a deep neural network. Credits: https://unsplash.com/photos/R84Oy89aNKs

Deep Hacking

Deep learning for vulnerability discovery


Here we describe the first systematic framework for using deep learning to detect...



The actual serial killer doll

The Anomaly Serial Killer Doll

Hunting missing checks with anomaly detection


Here we describe the system Chucky, which applies machine learning and natural language...



Screen showing source code

Exploiting Code Graphs

Mining graph representations for vulnerabilities


In this post, we introduce Yamaguchi's concept of code property graphs, how to traverse them,...



Can machines learn to hack?

Machine-Learning to Hack

Machine learning for vulnerability discovery


This post is a bird's eye view of machine learning techniques applied to vulnerability discovery...



Service status - Terms of Use - Privacy Policy - Cookie Policy

Copyright © 2021 Fluid Attacks, We hack your software. All rights reserved.