by George Karagiannidis | Mar 31, 2020 |
Introduction In this post, we will aim to touch on the CVE-2020-0796 vulnerability, which was initially publicly disclosed by Microsoft. This post also attempts to illustrate basic windbg usage for dynamic vulnerability analysis. IDA disassembler will also be used in...
by George Karagiannidis | May 23, 2016 |
Gaining access to a remote system always gives us pentesters a feeling of satisfaction. Specifically, gaining remote command execution on a system is the ultimate goal for a pentester, in order to gain an initial foothold into the target’s system. Besides direct...
by George Karagiannidis | Apr 14, 2015 |
App development is becoming more and more popular, as web and software developers are migrating to the mobile industry. Apps have become a part of mainstream culture and entered our everyday lives – at increasing levels. The app economy is comprised of approximately 2...