Explaining the basics of fuzzing

In the field of program analysis, different techniques are used, usually divided into two groups: static and dynamic. Fuzzing is a dynamic technique used extensively (especially in recent years) to discover bugs in software that, with a little (bad) luck,

Under “Summer” Construction

Summer arrives and with it the typical works in the university. As these magnificent moments usually come from power cuts and water, we have decided that taking advantage of these dates, we could not hurt a little vacation (until September).

Interview with Jaime Andrés Restrepo (@DragonJAR)

Jaime is one of the great references in security of the information of Latin America, and of the Spanish-speaking world in general. He has been working in the area for more than 10 years, specifically in ethical hacking, pentesting and

How does a linker work? (I)

In the process of converting the code from a high level language to an executable that understands our system, the linkers have a role that often goes unnoticed, but that is important to know. When we want to convert a

Problems of communication between languages

High-level languages such as Javascript, Python and Ruby are mainly characterized by facilitating the development of software in a simple and intuitive way and by presenting the highest abstraction level with respect to the machine on which they are executed,

Create an unreadable binary with these techniques

Whether for malicious purposes, such as the case of malware authors, for corporate purposes, or for other reasons, obfuscation techniques are used to protect a program by making compiled binary static analysis more costly. Obfuscation therefore consists of transforming a

Legal framework of impersonation (IV)

Continuing with the previous posts where we talked about the most common forms of identity theft on the internet, and having specified the usual modus operandi from the beginning to the end, we have not come to the end to

A denial of service is worth thousands of requests

Denial of Service (DOS) attacks are one of the most commonly used digital “weapons” for many purposes today. Some of its uses are blackmail, control of competitors, power test or deviation of attention. The concept of denial of service is

The memory corruption errors

When we talk about memory corruption errors, the first thing that we see at the head is the classic buffer overflow, which makes a lot of sense since, some called it the vulnerability of the decade back in 2000, nowadays continues

PackerInspector: Our sandbox for packers

We are pleased to present you PackerInspector, a new on-line service for packer analysis, created as the result of the research presented at IEEE Security & Privacy en 2015: SoK: Deep Packer Inspection: A Longitudinal Study of the Complexity of

PackerInspector

Our sandbox for packers

Categories