![Greek Cyber Security Challenge 2016 write-ups part 6: Ailianos VM-Reverse Engineering](https://twelvesec.com/wp-content/uploads/2017/10/ECSC-write-ups-min.jpg)
![Greek Cyber Security Challenge 2016 write-ups part 6: Ailianos VM-Reverse Engineering](https://twelvesec.com/wp-content/uploads/2017/10/ECSC-write-ups-min.jpg)
LATEST POSTS
- Domain Admin through a simple Xerox Printer July 24, 2024
- LedgerSMB – CVE-2024-23831: Privilege escalation through CSRF attack on “setup.pl” February 2, 2024
- The Current State of Phishing Attacks November 22, 2023
- Bypassing anti-reversing defences in iOS applications October 10, 2023
- iOS Instrumentation using Corellium, frida and r2frida September 27, 2023
- Basic knowledge to get started with Penetration Testing November 18, 2022
- Free Application Security Assessment for Start – Ups September 30, 2022
TAGS
pen-test
pentesting
IT security
Cyber Defense tool
cyber security
cybersecurity
Phising
social responsibility
Application Penetration Test
Corelan
self-isolation
computer security
capture the flag
pentest
Coronavirus
security
Ransomware attacks
social distancing
penetration test
android
Web Security
Penetration Testing
Information Leakage
collaborations
vulnerabilities
GDPR
Mobile Security
Privacy
Reverse Engineering
GDPR compliance
Burp Extender
Web Application Penetration Testing
infosec
Covid-19
iot
reversing
TwelveSec
ICT security
teleworking
mobile
ctf
Misconfigurations
community
CCPA
partnerships
ΝΟΤΕ
* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.