1 minAnti-Forensics: Avoiding the Pitfalls of Reality WinnerThis past week, NSA contractor Reality Winner, was caught and arrested for leaking information to the Interecept. This was evidence that...
6 minExploit Development, Part 2: Writing a Simple Buffer OverflowI. Introduction In the previous lesson in this module, we explored the basics of buffer overflows. We defined buffer overflows and looked...
3 minDigital Forensics, Part 9: Extracting EXIF Data from Graphics FilesIn many cases when a computer, phone, or mobile device is seized for evidence, the system will have graphic images that might be used as...
7 minLinux for Hackers, Part 8: Managing the User EnvironmentManaging the User Environment Among the areas that Linux newcomers find problematic, managing the user environment variables might be the...