RCE Via Arbitrary File Upload at Open eClass

Introduction The Open eClass platform (http://www.openeclass.org) is an integrated Learning Management System (LMS). It follows the philosophy of open source software and supports a multitude of...

BoFs Are Not Dead

Abstract Buffer overflow vulnerabilities remain highly relevant in embedded systems, where the absence of operating system abstractions and modern memory protection mechanisms creates conditions...

Is user training a good thing?

In the past years, there has been a major focus on end-user training as it is considered (and rightly so) the weakest link in the cybersecurity chain. I keep hearing more and more experts (and...

The three vectors of a pentest engagement.

There are 3 vectors that define a penetration test engagement. I. Knowledge of the attacker Blackbox The attacker has no previous knowledge of the scope, its technology stack nor the security...

Securing the Smart Future – Why IoT & Hardware Penetration Testing Is No Longer Optional

Introduction: The Explosive Rise of IoT and the Hidden RisksFrom smart homes and medical devices to connected factories and self-driving cars, the Internet of Things (IoT) is no longer futuristic....