![Greek Cyber Security Challenge 2016 write-ups part 6: Ailianos VM-Reverse Engineering](https://twelvesec.com/wp-content/uploads/2017/10/ECSC-write-ups-min.jpg)
![Greek Cyber Security Challenge 2016 write-ups part 6: Ailianos VM-Reverse Engineering](https://twelvesec.com/wp-content/uploads/2017/10/ECSC-write-ups-min.jpg)
LATEST POSTS
- Domain Admin through a simple Xerox Printer July 24, 2024
- LedgerSMB – CVE-2024-23831: Privilege escalation through CSRF attack on “setup.pl” February 2, 2024
- The Current State of Phishing Attacks November 22, 2023
- Bypassing anti-reversing defences in iOS applications October 10, 2023
- iOS Instrumentation using Corellium, frida and r2frida September 27, 2023
- Basic knowledge to get started with Penetration Testing November 18, 2022
- Free Application Security Assessment for Start – Ups September 30, 2022
TAGS
self-isolation
partnerships
CCPA
Application Penetration Test
pentesting
Cyber Defense tool
social responsibility
computer security
teleworking
IT security
community
Phising
Penetration Testing
GDPR compliance
reversing
social distancing
infosec
vulnerabilities
security
Web Application Penetration Testing
cybersecurity
GDPR
capture the flag
Covid-19
Mobile Security
Misconfigurations
Web Security
Information Leakage
android
penetration test
TwelveSec
collaborations
iot
Corelan
Burp Extender
pen-test
mobile
Coronavirus
Ransomware attacks
Reverse Engineering
cyber security
ctf
ICT security
Privacy
pentest
ΝΟΤΕ
* Opinions hosted on this blog do not necessarily represent TwelveSec, nor encourage the purchase of specific products or services. Any trademarks mentioned remain the property of the respective trademark holders. Tips provided are only provided as informative in nature and should not be relied on as advice or counsel.