I am convinced that if you follow the technological world, you will have heard during the last year or maybe before, about that wonderful technology known as blockchain destined according to many to revolutionize the world of cybersecurity and not…
I am convinced that if you follow the technological world, you will have heard during the last year or maybe before, about that wonderful technology known as blockchain destined according to many to revolutionize the world of cybersecurity and not…
Executables are a static representation of a program and that at the time they are executed, the kernel uses the information included in those files to create a dynamic representation, better known as the process images. Before being able to execute…
Although hacking began as simple entertainment for a group of enthusiastic young people, much has changed since then. Today, all countries have, to a greater or lesser extent, a response or attack group of this type. The clearest examples would…
In the previous post we talked about the possibilities to implement programs and carry out all kinds of tasks such as profiling or vulnerability detection. We also introduced Intel Pin, a dynamic binary instrumentation tool (mainly for IA32 and x86_64),…
It is possible to access any content through a different network than the one we initially encountered. With a simple example, if we were initially in Spain, we could access a certain web page as if we were really in…
Many of the methods of software testing and dynamic analysis of programs (not necessarily related to security) require inserting some additional instructions in the text of the program to obtain added information, that is, to instrument the program. For example,…