content top

Exploit Reliability Testing System

Exploit Reliability Testing System

0Introduction   One of my friend was playing with “MS13-009” a Use After Free vulnerability in Internet Explorer which leads to Remote Code Execution. He asked me to help him in writing a reliable exploit for this vulnerability. Once I started looking into the vulnerability, I realized that this vulnerability is unreliable due to the fact that there is a very small window between free and use of the freed object. More...

Read More

Shellcode Of Death – null Security Meet

Shellcode Of Death – null Security Meet

0Introduction   It’s was my pleasure to talk about “Shellcode Of Death” a.k.a “Wicked Sunny“. The event was null Pune which held @SICSR.   Topics and Schedules   04:00 PM – 04:10 PM: Introduction by Null + G4H team 04:10 PM – 05:15 PM : Shell Code of Death by Ashfaq Ansari.   I was giving the talk on “Shellcode Of Death” a.k.a “Wicked...

Read More

VMware Video Series – Part 2

VMware Video Series – Part 2

5Introduction                 Hello,   In this video, we will install VMware Tools and see simple Netwotking stuff.   Please leave back comments for any feed back.   Regards,   HackSys Team – Panthera     20,891 total views, 1 views today

Read More

VMware Video Series – Part 1

VMware Video Series – Part 1

5Introduction                   Hello,   Welcome to VMware video series.  Finally, we released the first video of VMware video series.   In this video we will look into installing VMware Workstation. We will install VMware Tools that is an important part of VMware.   Possibly the new videos will come soon.   Leave back comments if you want to suggest us something. We will...

Read More

UAC Toggle v1.0

UAC Toggle v1.0

11    Introduction     User Account Control (UAC) is a technology and security infrastructure introduced with Microsoft’s Windows Vista and Windows Server 2008 operating systems, with a more relaxed version also present in Windows 7 and Windows Server 2008 R2.     It aims to improve the security of Microsoft Windows by limiting application software to standard user privileges until an administrator...

Read More
content top