nixhacker - The Reverser's Space nixhacker - The Reverser's Space
  • Home
  • Security
  • Tutorials
  • RSS/Feeds
  • Topics
  • Authors
  • About Us
  • Follow
    Subscribe to nixhacker - The Reverser's Space
    Get the latest posts delivered right to your inbox
    Great! Check your inbox and click the link to confirm your subscription
    Please enter a valid email address!
  • Log in Sign up
Summary of linux kernel security protections and associated attacks
Linux

Summary of linux kernel security protections and associated attacks

Uncovering the security protections in MAC - XProtect and MRT
MacOS Security

Uncovering the security protections in MAC - XProtect and MRT

Uncovering the  security protections in MacOS - Gatekeeper
MacOS Security

Uncovering the security protections in MacOS - Gatekeeper

Hooking or Monitoring System calls in linux using ftrace
Rootkits

Hooking or Monitoring System calls in linux using ftrace

24 September 2021
Remote debugging windows kernel driver(without symbols) using windbg
Reverse engineering

Remote debugging windows kernel driver(without symbols) using windbg

2 July 2021
Firmware security 3: Digging into System management mode (SMM)
Firmware

Firmware security 3: Digging into System management mode (SMM)

20 March 2021
Firmware security 1: Playing with PCI device memory
Firmware

Firmware security 1: Playing with PCI device memory

14 November 2020
Impact of x64 calling convention in format string exploitation
Exploit Development

Impact of x64 calling convention in format string exploitation

20 October 2020
Fixing DLL exports for DLL hijacking(DLL proxy)
Windows OS

Fixing DLL exports for DLL hijacking(DLL proxy)

5 August 2020
Mitigate and Detect Local Privilege Escalation cause due to Symbolic Links
Windows OS

Mitigate and Detect Local Privilege Escalation cause due to Symbolic Links

31 July 2020
Developing and Installing your first Kernel driver in Windows 10(under 10 min)
Tutorial

Developing and Installing your first Kernel driver in Windows 10(under 10 min)

10 June 2020
Breaking Antivirus: Arbitrary file deletion using Symbolic link
Exploit Development

Breaking Antivirus: Arbitrary file deletion using Symbolic link

A newly discovered symbolic link attack in many antivirus can cause arbitrary file deletion. In this blog, we will be discussing how to create the exploit and mitigate it.
By Shubham Dubey 28 Apr 2020
Understanding and Exploiting Symbolic links in Windows - Symlink Attack EOP
Exploit Development

Understanding and Exploiting Symbolic links in Windows - Symlink Attack EOP

Symbolic link can be abused to cause elevation of privilege or arbitrary write/delete. In this article we are going to understand symlink and will learn how to exploit/abuse them.
By Shubham Dubey 16 Apr 2020
Segmentation in Intel x64(IA-32e) architecture - explained using Linux
Intel architecture

Segmentation in Intel x64(IA-32e) architecture - explained using Linux

In this article we will go through Segmentation in basic and cover it for x64 (IA-32e) processors by extracting the details inside a Linux system.
By Shubham Dubey 21 Feb 2020
Malware analysis interview questions with detailed answers (Part 4)
Malware

Malware analysis interview questions with detailed answers (Part 4)

In this part we will discuss advance as well as miscellaneous questions for malware analysis interview. Even if you are already an experienced researcher, still these questions can be helpful for learning some new stuff.
By Shubham Dubey 26 Dec 2019

Featured Posts

Uncovering the  security protections in MacOS - Gatekeeper

Uncovering the security protections in MacOS - Gatekeeper

22 February 2022
Firmware security 3: Digging into System management mode (SMM)

Firmware security 3: Digging into System management mode (SMM)

20 March 2021
Firmware security 1: Playing with PCI device memory

Firmware security 1: Playing with PCI device memory

14 November 2020
Mitigate and Detect Local Privilege Escalation cause due to Symbolic Links

Mitigate and Detect Local Privilege Escalation cause due to Symbolic Links

31 July 2020

Newsletter

Stay up to date! Get all the latest & greatest posts delivered straight to your inbox
Great! Check your inbox and click the link to confirm your subscription
Please enter a valid email address!

Tag Cloud

Security (25) Linux (23) Tutorial (17) Windows OS (14) Reverse engineering (13) Firmware (12) Analysis (11) Virtualization (10) Malware (10) Rootkits (8) Intel architecture (7) Exploit Development (5)
  • Contact Us
  • Write For Us
Copyright 2023, nixhacker - The Reverser's Space. All Rights Reserved. Design with by @GodoFredoNinja
nixhacker - The Reverser's Space nixhacker - The Reverser's Space

  • Home
  • Security
  • Tutorials
  • RSS/Feeds
  • Topics
  • Authors
  • About Us

Log in Sign up

Follow
Search suggestions