And It Begins, begins Ooh ooh ooh!
Actually, this my first blog dedicated to security. People that know me and maybe you, have heard of some of my projects like : Slashon, Invihertz, and so on. I’ve done also few conferences about...
View ArticleRing 0f Fire : Rootkits and DKOM
Many books and papers cover the subject of Rootkits. I wrote this article to describe my first steps. Here, you will learn what a rootkit is and how does it work. Also you will find an attack using...
View ArticleRSSIL [captcha]: Des chiffres et des lettres
About RSSIL Two weeks ago, the team HzV was in Maubeuge (France) to attend to the RSSIL[0]. This event was really nice. Moreover, we have seen some interesting talks, workshops and a great Capture The...
View ArticleThe Art Of ELF: Analysis and Exploitations
New systems make attackers life hard and common exploitation techniques get harder to reproduce. The purpose of this article is to be very general on mitigation techniques and to cover attacks on...
View ArticleThe magic of LD_PRELOAD for Userland Rootkits
How much can you trust binaries you are running, even if you had analyzed them before compilation? With less privileges than kernel rootkits (explained in “Ring 0f Fire”), userland rootkits still...
View Article
More Pages to Explore .....