nixhacker - The Reverser's Space
  • Home
  • Security
  • Tutorials
  • RSS/Feeds
  • Topics
  • Authors
  • About Us
  • Follow
    Subscribe to nixhacker - The Reverser's Space
    Get the latest posts delivered right to your inbox
    Great! Check your inbox and click the link to confirm your subscription
    Please enter a valid email address!
  • Log in Sign up
Exploiting buffer overflow in Windows application through TextBox using only Alphanumeric payload
Exploit Development

Exploiting buffer overflow in Windows application through TextBox using only Alphanumeric payload

Lets look at how to exploit seh based buffer overflow in WIndows GUI application that have input restrictions of supporting only ascii characters as input.
By Shubham Dubey 7 Sep 2018
Malware analysis interview questions with detailed answers (Part 2)
Malware

Malware analysis interview questions with detailed answers (Part 2)

Here are few more important questions with detailed answers for malware analysis interview. Topic covers in this part is OS concepts, Programming, Assembly language and Dynamic analysis.
By Shubham Dubey 6 Aug 2018
Malware analysis interview questions with detailed answers (Part 1)
Malware

Malware analysis interview questions with detailed answers (Part 1)

Here is a series of important questions with detailed answers for malware analysis interviews. These question can be helpful for both candidates and interviewers.
By Shubham Dubey 3 Aug 2018
Deep dive into Tofsee spambot(Win32:Tofsee-J)  malware dropper-2
Malware

Deep dive into Tofsee spambot(Win32:Tofsee-J) malware dropper-2

In this part we will do the static analysis of dropper of tofsee .Tofsee is a spambot categorie of malware used to send spam messages, click fraud to different smtp mail server.
By Shubham Dubey 5 Jul 2018
Deep dive into Tofsee spambot(Win32:Tofsee-J)  malware dropper-1
Malware

Deep dive into Tofsee spambot(Win32:Tofsee-J) malware dropper-1

Tofsee is a spambot categorie of malware used to send spam messages, click fraud to different smtp mail server. In this part we will do the dynamic analysis of dropper of tofsee.
By Shubham Dubey 3 Jul 2018
Understanding Windows DKOM(Direct Kernel Object Manipulation) techniques(Part 1-EPROCESS)
Rootkits

Understanding Windows DKOM(Direct Kernel Object Manipulation) techniques(Part 1-EPROCESS)

Windows uses different Objects structures for different purposes like io-management, process management etc. These structures are vulnerable to different attacks which we will going to discuss in this series.
By Shubham Dubey 13 Jun 2018
Let's discuss about vpn's and tor security
Security

Let's discuss about vpn's and tor security

Last week I was looking at Tor network security. I have learnt quite a new things that I didn't knew about earlier. So, I decide to summarize it and put it in a article.
By Shubham Dubey 13 Jun 2018
Creating encrypted partition in linux
Security

Creating encrypted partition in linux

The risk of systems getting physically compromise, particularly portable systems such as laptops, puts sensitive data at risk of compromise. Encrypting its data mitigates the risk of getting exposure if system is lost.
By Kshitij Upadhyay 10 Feb 2018
Creating ARM architecture environment inside x86/x64 linux
Virtualization

Creating ARM architecture environment inside x86/x64 linux

If you want your hands on arm architecture assembly then you probably would be wondering how can I generate the *ARM* assembly or use ARM toolset in general inside my intel x86 or x64 architecture system. In this article we will explain you how you can do that by using qemu and chroot.
By Shubham Dubey 9 Feb 2018
Reduce Security Risks with SELinux
Security

Reduce Security Risks with SELinux

Discover SELinux, a security module that provides extra protocols to ensure access control security. It supports mandatory access controls (MAC) and is an integral part of RHEL’s security policy.
By Kshitij Upadhyay 3 Feb 2018
Exploiting Off-by-One buffer overflow vulnerability
Exploit Development

Exploiting Off-by-One buffer overflow vulnerability

Off-by-one vulnerability is little difficult to find and hence can be present in big softwares.It can cause due to not aware of fact if your string provided is not null terminating then strcpy will add a null terminator at the end of string,
By Shubham Dubey 29 Jan 2018
Replace your proprietary bios with linux firmware
Firmware

Replace your proprietary bios with linux firmware

Intel system comes with UEFI, UEFI is a proprietary and closed-source operating system that can be exploited.NERF (Non-Extensible Reduced Firmware), an open source software system developed at Google can replace almost all of UEFI firmware with a tiny Linux kernel and initramfs.
By Shubham Dubey 5 Jan 2018
Demystifying Linux Containers(LXC)
Containers

Demystifying Linux Containers(LXC)

Containers are the future when it comes to using and shipping applications. But Linux containers or LXC can be used for more than just that. This article covers the use of LXC on a daily basis as well as for production.
By Shubham Dubey 2 Jan 2018
Finding and removing malware from windows in minimal steps using sysinternals suite
Security

Finding and removing malware from windows in minimal steps using sysinternals suite

Did your system ever get affected with malwares? Did you know you can manually remove common malwares with very little technical knowledge. In this article I will explain you how to find malware using sysinternals suite.
By Shubham Dubey 31 Dec 2017
Sandboxing and program isolation in linux using many approaches (Part 2)
Security

Sandboxing and program isolation in linux using many approaches (Part 2)

Containers are tools for isolation which use namespaces to archive that.They are called light weight virtualization because they provide process level isolation only, means they depend on linux kernel.
By Shubham Dubey 30 Dec 2017

Featured Posts

Uncovering the  security protections in MacOS - Gatekeeper

Uncovering the security protections in MacOS - Gatekeeper

22 February 2022
Firmware security 3: Digging into System management mode (SMM)

Firmware security 3: Digging into System management mode (SMM)

20 March 2021
Firmware security 1: Playing with PCI device memory

Firmware security 1: Playing with PCI device memory

14 November 2020
Mitigate and Detect Local Privilege Escalation cause due to Symbolic Links

Mitigate and Detect Local Privilege Escalation cause due to Symbolic Links

31 July 2020

Newsletter

Stay up to date! Get all the latest & greatest posts delivered straight to your inbox
Great! Check your inbox and click the link to confirm your subscription
Please enter a valid email address!

Tag Cloud

Security (29) Linux (27) Windows OS (21) Tutorial (19) Analysis (15) Reverse engineering (14) Firmware (12) Virtualization (10) Malware (10) Exploit Development (9) Rootkits (8) Intel architecture (7)
  • Contact Us
  • Write For Us
Copyright 2025, nixhacker - The Reverser's Space. All Rights Reserved. Design with by @GodoFredoNinja
nixhacker - The Reverser's Space

  • Home
  • Security
  • Tutorials
  • RSS/Feeds
  • Topics
  • Authors
  • About Us

Log in Sign up

Follow
Search suggestions