Category Archives: Security Research

Linux x86 Reverse Engineering

Most of the Windows as well as Linux based programs contains bugs or security holes and/or errors. These bugs or error in program can be exploited in order to crash the program or make system do unwanted stuff Exploit usually attacks the program on Memory Corruption, Segmentation Dump, format string, Buffer overflow or something else.… Read More »

Enterprise Security Management

An enterprise invests considerable amount of time in its day to day scanning and managing patched for the infrastructure. But, an enterprise psychological analysis shows us otherwise i.e. most of the enterprises shy away from scanning and patching their business critical infrastructure in a fear of interrupting their already established critical applications. Another side of… Read More »

Webview mail app vulnerability

WebView is an essential component in Android and iOS. It enables applications to display content from on-line resources. It simplifies task of performing a network request, parsing the data and rendering it. WebView uses a number of APIs which can interact with the web contents inside WebView. In the current paper, Cross-site scripting attacks or… Read More »

HoneyPot – Dr. Daniel Singh

Dr. Daniel Singh has sent his presentation to us about HoneyPots. Dr Daniel Singh is a CISO at Technogeeks, A security researcher, evangelist, Certified Ethical Hacker and a ECSA himself. He has also presented papers at International conferences and in the Indian scene he has been an active participant at the DEFCON Bangalore (DC9180) meet.… Read More »

Exploit writing for beginners – Sabari Selvan

The following post explains about basics of exploit writing for beginners by Sabari Selvan of E-hacking news. Sabari Selvan is an Information Security Researcher who has more interest in PenTesting and Malware analysis. – See more at: The post explains the following: a) What is exploit writing b) Impact of exploits c) Introduction to… Read More »

DC9180 – Diving in to the Deep web with Tor

An interesting presentation uncovering the deep web by Mr. Nikhil Kulkarni a.k.a Intrud3r. In his free time, he hunts for bugs, bounties, and penetrates web applications for fun and profit. This paper was presented at DC9180 – DEFCON Bangalore Meet 2013. If you want to know all about TOR – The Onion Router Have a… Read More »

DC9180 – Hunting bugs the Bounty way

This talk informs you all you should know about finding bug bounty. Various scenarios, tools, procedure, real time replies etc. About the speaker: Nikhil P Kulkarni a.k.a Intrud3r Web application Pentester | Blogger | Bug Hunter | Researcher at CSPF | Listed in various hall of fames   You can find the full presentation at… Read More »