Introduction Return-to-libc AKA Ret2Libc is a form of buffer overflow attack that bypasses stack execution protection mechanisms, such as the…
Introduction AWS Elastic Beanstalk(EB) is an easy-to-use service for deploying and scaling web applications and services developed with Java, .…
Introduction When powershell was first released it was immediately abused by attackers so to help defenders Microsoft came out with…
Introduction When people hear javascript vulnerabilities most people think of cross site scripting(XSS). However, there are other types of vulnerabilities…
Introduction You have probably heard of sql injection which impacts relational databases and you may have heard of nosql injection(https://ghostlulz.com/nosql-injection/)…
Introduction Host header injection is a web application attack where the attacker provides a false Host header to the web…
Introduction I’m sure most of you have heard of SQL injection but what about NoSQL injection? SQL injection is in…
Introduction As some of you may know I own a company called Offensive AI http://offensiveai.com/ . Our mission is to…
Slack Group Before we get started I have started a slack group dedicated to hacking. We welcome everyone from beginner…
Slack Group Before we get started I have started a slack group dedicated to hacking. We welcome everyone from beginner…