Practice Assembly With A Buffer Overflow Exercise

Practice Assembly With A Buffer Overflow Exercise

Buffer Overflows in 2025? Buffer overflows are one of the oldest computer vulnerabilities, stemming all the way back to the invention of the C programming language in the 1970s. Despite the fact that they are well-known and have been exploited for over 40 years, they...
Follina RCE Exploitation – CVE-2022-30190

Follina RCE Exploitation – CVE-2022-30190

Introduction It was reported on May 30th by Microsoft that the Microsoft Support Diagnostic Tool (MSDT) was being actively exploited to obtain RCE on systems. The vulnerability, which can be executed through malicious Office documents, can be used to access remote...
Bypassing Defender the Easy Way – Fodhelper

Bypassing Defender the Easy Way – Fodhelper

If you’ve ever tried to run a command prompt as administrator on your Windows OS before, you’ve seen a harmless popup appear. This is Windows User Account Control, or UAC. According to Microsoft, UAC “is a fundamental component of Microsoft’s overall security vision....
SMB Relay Attacks – Gift That Keeps on Giving

SMB Relay Attacks – Gift That Keeps on Giving

Trendy vulnerabilities like PrinterNightmare and attacking Active Directory Certificate Services may seem incredible currently (and they are), but they end up being manually patched out and dealt with over time. Systems administrators will consider their risk and...