Exploit Development Nostalgic memory - An attempt to understand the evolution of memory corruption mitigations - Part 4 This article series is a technical dive into the evaluation of these memory corruption mitigations. This part is focus on memory error detection tools introduced over years. By Shubham Dubey 7 Jan 2024
Exploit Development Nostalgic memory - An attempt to understand the evolution of memory corruption mitigations - Part 3 This article series is a technical dive into the evaluation of these memory corruption mitigations. This part is focus on mitigations that second generation, mostly introduced after 2010. By Shubham Dubey 7 Jan 2024
Exploit Development Nostalgic memory - An attempt to understand the evolution of memory corruption mitigations - Part 2 This article series is a technical dive into the evaluation of these memory corruption mitigations. This part is focus of mitigations that first generation, introduced before 2010 mostly. By Shubham Dubey 7 Jan 2024
Exploit Development Nostalgic memory - An attempt to understand the evolution of memory corruption mitigations - Part 1 Arbitrary Code execution due to memory corruption is there since the years and still a major thing. Over the year, new protective measures have been introduced periodically to mitigate these attacks.This article series is a technical dive into the evaluation of these memory corruption mitigations. By Shubham Dubey 7 Jan 2024
Linux Summary of linux kernel security protections and associated attacks Linux kernel goes through rapid changes frequently. Unlike other platforms, Linux security features are not advertised enough and are limited to mail threads. Since Linux is getting more popular, it's important to be aware about protections it provides against sophisticated attacks targeting kernel. By Shubham Dubey 1 Jan 2023
Rootkits Hooking or Monitoring System calls in linux using ftrace In this post we will see how can you use ftrace to hook linux system calls. For learning purpose, we will create a kernel module that will make any target file immutable in system. By Shubham Dubey 24 Sep 2021
Firmware Firmware security 1: Playing with PCI device memory In this part of the series we will go through the basic of PCI devices and their memory. We will be developing linux kernel driver and using chipsec to analyze the data practically. By Shubham Dubey 14 Nov 2020
Exploit Development Impact of x64 calling convention in format string exploitation In this post I will try to give you a brief on how format string exploitation can differ in 64 bit architecture due to different calling convention in 64 bit. By Shubham Dubey 20 Oct 2020
Intel architecture Segmentation in Intel x64(IA-32e) architecture - explained using Linux In this article we will go through Segmentation in basic and cover it for x64 (IA-32e) processors by extracting the details inside a Linux system. By Shubham Dubey 21 Feb 2020
Virtualization Developing hypervisor from scratch: Part 4 - Setting up HOST and GUEST State In this article series you are going to learn how to develop your own hypervisor for virtualization in linux ecosystem. In this part we will do the setup of HOST and GUEST state area and at last the vmlaunch. By Shubham Dubey 12 Nov 2019
Virtualization Developing hypervisor from scratch: Part 3 - Setting up VMCS In this article series you are going to learn how to develop your own hypervisor for virtualization in linux ecosystem. In this part we will do the setup of VMCS structure. By Shubham Dubey 30 Sep 2019
Virtualization Developing hypervisor from scratch: Part 2 - VMXON Operation In this article series you are going to learn how to develop your own hypervisor for virtualization in linux ecosystem. In this part we will execute VMXON operation. By Shubham Dubey 9 Aug 2019
Virtualization Developing hypervisor from scratch: Part 1 - Intro and Setup In this article series you are going to learn how to develop your own hypervisor for virtualization in linux ecosystem. Also this series will help to learn low level virtualization. By Shubham Dubey 8 Aug 2019
Firmware Getting processor information using cpuid instruction and inline assembly cpuid is a processor specific instruction used to get processor's information and features. In this post we are going to learn how to extract those information using inline assembly in c. By Shubham Dubey 19 Jul 2019
Malware Malware analysis interview questions with detailed answers (Part 3) Here are few more important questions with detailed answers for malware analysis interview. Topic covers in this part is Dynamic analysis, static analysis and debugging. By Shubham Dubey 18 Sep 2018