When we talk about memory corruption errors, the first thing that we see at the head is the classic buffer overflow, which makes a lot of sense since, some called it the vulnerability of the decade back in 2000, nowadays continues…
When we talk about memory corruption errors, the first thing that we see at the head is the classic buffer overflow, which makes a lot of sense since, some called it the vulnerability of the decade back in 2000, nowadays continues…
In the series Hardening binaries posts you have seen that many defenses are implanted in the compilers themselves, but how are they implemented? Taking the case of GCC, the GNU compiler collection, let’s explain the general GCC infrastructure and roughly how…
Continuing with the previous post where the typical identity impersonation behaviors are identified, and once we have identified the legal basis that recognizes criminal type based on article 248.1 LO 10/1995 of the Criminal Code, Operandi usually follows the offense…
It is extremely common for advanced malware not only to hide its code with different packers, but also to try to detect if it is being analyzed dynamically through a sandbox. If they realize that they are watching it, they…
Although vulnerabilities caused by improper use of format strings may not seem like a theme of the last century, a small search in the CVE database shows us that these errors are still happening. The danger of format string is given…
The types, thematic, or rather, the scam campaigns, have been evolving over time as well as their means of distribution. Nowaydays , among the most typical campaigns are, among others, those that make the victim believe that he has won (mysteriously)…