nixhacker - The Reverser's Space
  • Home
  • Security
  • Tutorials
  • RSS/Feeds
  • Topics
  • Authors
  • About Us
  • Follow
    Subscribe to nixhacker - The Reverser's Space
    Get the latest posts delivered right to your inbox
    Great! Check your inbox and click the link to confirm your subscription
    Please enter a valid email address!
  • Log in Sign up
Fixing DLL exports for DLL hijacking(DLL proxy)
Windows OS

Fixing DLL exports for DLL hijacking(DLL proxy)

In this post we will discuss ways to export functions from your dll for dll hijacking. Exporting functions | Dll Proxy
By Shubham Dubey 5 Aug 2020
Mitigate and Detect Local Privilege Escalation cause due to Symbolic Links
Windows OS

Mitigate and Detect Local Privilege Escalation cause due to Symbolic Links

In this post we will discuss ways to mitigate symbolic links based Local privilege escalation exploits. We are also going to develop our own protection against these attacks.
By Shubham Dubey 31 Jul 2020
Developing and Installing your first Kernel driver in Windows 10(under 10 min)
Tutorial

Developing and Installing your first Kernel driver in Windows 10(under 10 min)

Windows kernel development is painful to follow after lots of changes in driver handling by windows. In this article I will help you with developing and installing your driver in less than 10 minutes in windows 10.
By Shubham Dubey 10 Jun 2020
Breaking Antivirus: Arbitrary file deletion using Symbolic link
Exploit Development

Breaking Antivirus: Arbitrary file deletion using Symbolic link

A newly discovered symbolic link attack in many antivirus can cause arbitrary file deletion. In this blog, we will be discussing how to create the exploit and mitigate it.
By Shubham Dubey 28 Apr 2020
Understanding and Exploiting Symbolic links in Windows - Symlink Attack EOP
Exploit Development

Understanding and Exploiting Symbolic links in Windows - Symlink Attack EOP

Symbolic link can be abused to cause elevation of privilege or arbitrary write/delete. In this article we are going to understand symlink and will learn how to exploit/abuse them.
By Shubham Dubey 16 Apr 2020
Segmentation in Intel x64(IA-32e) architecture - explained using Linux
Intel architecture

Segmentation in Intel x64(IA-32e) architecture - explained using Linux

In this article we will go through Segmentation in basic and cover it for x64 (IA-32e) processors by extracting the details inside a Linux system.
By Shubham Dubey 21 Feb 2020
Malware analysis interview questions with detailed answers (Part 4)
Malware

Malware analysis interview questions with detailed answers (Part 4)

In this part we will discuss advance as well as miscellaneous questions for malware analysis interview. Even if you are already an experienced researcher, still these questions can be helpful for learning some new stuff.
By Shubham Dubey 26 Dec 2019
Developing hypervisor from scratch: Part 4 - Setting up HOST and GUEST State
Virtualization

Developing hypervisor from scratch: Part 4 - Setting up HOST and GUEST State

In this article series you are going to learn how to develop your own hypervisor for virtualization in linux ecosystem. In this part we will do the setup of HOST and GUEST state area and at last the vmlaunch.
By Shubham Dubey 12 Nov 2019
Developing hypervisor from scratch: Part 3 - Setting up VMCS
Virtualization

Developing hypervisor from scratch: Part 3 - Setting up VMCS

In this article series you are going to learn how to develop your own hypervisor for virtualization in linux ecosystem. In this part we will do the setup of VMCS structure.
By Shubham Dubey 30 Sep 2019
Developing hypervisor from scratch: Part 2 - VMXON Operation
Virtualization

Developing hypervisor from scratch: Part 2 - VMXON Operation

In this article series you are going to learn how to develop your own hypervisor for virtualization in linux ecosystem. In this part we will execute VMXON operation.
By Shubham Dubey 9 Aug 2019
Developing hypervisor from scratch: Part 1 - Intro and Setup
Virtualization

Developing hypervisor from scratch: Part 1 - Intro and Setup

In this article series you are going to learn how to develop your own hypervisor for virtualization in linux ecosystem. Also this series will help to learn low level virtualization.
By Shubham Dubey 8 Aug 2019
Getting processor information using cpuid instruction and inline assembly
Firmware

Getting processor information using cpuid instruction and inline assembly

cpuid is a processor specific instruction used to get processor's information and features. In this post we are going to learn how to extract those information using inline assembly in c.
By Shubham Dubey 19 Jul 2019
What's at 1st sector/MBR of hard disk(MBR Forensics)
Reverse engineering

What's at 1st sector/MBR of hard disk(MBR Forensics)

MBR have lots of details about the hard disk or other storage disk which can be used for forensics purposes. In this article we will analyze the MBR's 512 bytes of data and try to interpret it.
By Shubham Dubey 22 Nov 2018
Analyse default BIOS protection of your system against LoJax: UEFI rootkit
Firmware

Analyse default BIOS protection of your system against LoJax: UEFI rootkit

LoJax is first rootkit in the wild that try to write a UEFI module into system's SPI Flash Memory. You can analyse your system's default BIOS/UEFI protection against such malware which we will discuss in this article.
By Shubham Dubey 28 Sep 2018
Malware analysis interview questions with detailed answers (Part 3)
Malware

Malware analysis interview questions with detailed answers (Part 3)

Here are few more important questions with detailed answers for malware analysis interview. Topic covers in this part is Dynamic analysis, static analysis and debugging.
By Shubham Dubey 18 Sep 2018

Featured Posts

Uncovering the  security protections in MacOS - Gatekeeper

Uncovering the security protections in MacOS - Gatekeeper

22 February 2022
Firmware security 3: Digging into System management mode (SMM)

Firmware security 3: Digging into System management mode (SMM)

20 March 2021
Firmware security 1: Playing with PCI device memory

Firmware security 1: Playing with PCI device memory

14 November 2020
Mitigate and Detect Local Privilege Escalation cause due to Symbolic Links

Mitigate and Detect Local Privilege Escalation cause due to Symbolic Links

31 July 2020

Newsletter

Stay up to date! Get all the latest & greatest posts delivered straight to your inbox
Great! Check your inbox and click the link to confirm your subscription
Please enter a valid email address!

Tag Cloud

Security (29) Linux (27) Windows OS (21) Tutorial (19) Analysis (15) Reverse engineering (14) Firmware (12) Virtualization (10) Malware (10) Exploit Development (9) Rootkits (8) Intel architecture (7)
  • Contact Us
  • Write For Us
Copyright 2025, nixhacker - The Reverser's Space. All Rights Reserved. Design with by @GodoFredoNinja
nixhacker - The Reverser's Space

  • Home
  • Security
  • Tutorials
  • RSS/Feeds
  • Topics
  • Authors
  • About Us

Log in Sign up

Follow
Search suggestions