The best resources for learning exploit development Exploit development is considered to be the climax in the learning path of an ethical hacker or security professional. It is strongly advisable to have mastered the basics before delving into this topic. Exploit development is hard and it’s not something you learn at school or university (usually), not something any of your …
Rock and Roll your Kali Linux 2016.1 – rolling ftw
You have been using Backtrack first and Kali Linux after, now reaching version 2 (codename “sana”) and you love it, don’t you? Yeah, everybody does. We’ve seen a huge increase in the adoption of this distro by security professionals, geeks and wannabies. The number of tools increased year by year and and so did its stability. Backtrack was Ubuntu based, …
ZoomEye : the CyberSpace search engine you never heard of
Everyone knows about the beloved Shodan and the new valid alternative Censys for searching IoT devices, even general newspaper wrote articles about them, but are you sure you aren’t missing anything? ZoomEye is a search engine for Cyberspace In Chinese ancient legends, there’s a famous ghost buster named Zhong Kui. Just like him, ZoomEye is created for hunting the demons in Cyberspace. …
The Firewalls’ backdoor saga: Fortinet under fire
Do you remember that less than a month ago Juniper Networks was in the limelight for its backdoor in ScreenOS software? A lot of speculation was done on the case and probably the NSA was involved at some point 🙂 . On Saturday 9th January 2016 an anonymous user sent the following email to the Full Disclosure mailing list: SSH …