Stack Based Buffer Overflows on x64 (Windows)
https://nytrosecurity.com/2018/01/24/stack-based-buffer-overflows-on-x64-windows/
https://nytrosecurity.com/2018/01/24/stack-based-buffer-overflows-on-x64-windows/
Nytro Security
Stack Based Buffer Overflows on x64 (Windows)
The previous two blog posts describe how a Stack Based Buffer Overflow vulnerability works on x86 (32 bits) Windows. In the first part, you can find a short introduction to x86 Assembly and how the…
Debugging Android third-party Java apps with native methods -
https://kov4l3nko.github.io/blog/2018-01-25-debugging-mixed-android-code/
https://kov4l3nko.github.io/blog/2018-01-25-debugging-mixed-android-code/
https://www.scmagazine.com/can-wannacry-save-the-cybersecurity-world-from-its-gender-divide/article/718554/
✅ article by Noushin Shabab (Iranian women security specialist) 👍!
✅ article by Noushin Shabab (Iranian women security specialist) 👍!
SC Media US
Can WannaCry save the cybersecurity world from its gender divide?
I was a delegate at a recent technical conference in Australia. The rooms were full of the cybersecurity industry's brightest talent, all of whom were prof
This media is not supported in your browser
VIEW IN TELEGRAM
Good Dribbling 👌😌 #FiFA18
Forwarded from PacktPub Free Learning
Markdown parsing issue enables insertion of malicious tags and event handlers
https://hackerone.com/reports/299728
https://hackerone.com/reports/299728
HackerOne
HackerOne disclosed on HackerOne: Markdown parsing issue enables...
When markdown is being presented as HTML, there seems to be a strange interaction between _ and @ that lets an attacker insert malicious tags.
# Proof of Concept...
# Proof of Concept...