Crack Me Challenge Part 4
First we must take a look at the following piece of code that will be presented in the code segment 5: 004017FC |. B8 40000000 mov eax,40 00401801 |. 33C9 xor ecx,ecx 00401803 |> 8B940C C000000>/mov edx,dword ptr ss:[esp+ecx+C0] 0040180A |. 3B540C 70 |cmp edx,dword ptr ...
WordPress Security
Introduction There are numerous tools available when checking the security of the WordPress Content Management System (CMS). In the rest of the article we'll mention the WPScan tool, which does a great job of scanning the WordPress installation and its plugins for security vulnerabilities. WPScan WPScan is a WordPress ...
CrackMe Challenge Part 3: The Logic Behind the First Challenge
If we take our predicate that we've seen in the end of part 2 into account and input at least 64 bytes (0x40) into the Key 1 field and leave the Name field at a value AAAAAAAA, a second message box is displayed as can be seen in the ...
CrackMe Challenge Part 2
The First Message Box Let's start our unpacked program with OllyDbg, run it, input eight A's into the Name and Key 1 field and press CHECK STAGE 1. What happens is that a warning message is displayed saying that the key is invalid as is presented in the ...
ESET Rule the Code - CrackMe Challenge Part 1: The Unpacking Process
Presenting the Problem The CrackMe challenge was first observed on the ESET CrackMe web page, which looked like the the picture below: On the web page we can observe that the challenge is being held at Black Hat 2012. The winner will receive free entry into one of the conferences ...
Vulnerable Applications
Introduction How often have we found ourselves in need of a vulnerable application, which we could use for various purposes? We could use such applications to test the web application scanners to assess the effectiveness of each scanner. We could also use vulnerable applications to test our knowledge of specific ...
Nessus
Nessus is an automatic vulnerability scanner that can detect most known vulnerabilities, such as misconfiguration, default passwords, unpatched services, etc. From the following picture, we can see that Nessus can be classified as a vulnerability scanner, which is in turn part of the automatic scanners. Installing Nessus To install Nessus ...
Achieving Anonymity with Tor Part 5: Tor Bridges and Hidden Services
Introduction to Tor Bridging Running a Tor bridge is essentially the same as running a Tor relay, as far as configuration is concerned. We already mentioned that the only difference is that Tor bridges are not listed in the Tor directory. We also said that using a bridge is helpful ...
Achieving Anonymity with Tor Part 4: Tor Relays
Introduction We've seen that Tor network is constituted from Tor nodes, through which we tunnel our traffic to reach anonymity. So far we didn't bother with terminology, because it wasn't important; all we wanted to achieve was anonymity, which we did. But when we're trying to ...
Achieving Anonymity with Tor Part 3: Torbutton and Tsocks
Introduction In previous articles: Part 1 and Part 2 we extensively used the Tor Browser Bundle that helps us ensure our anonymity. With the Tor Browser Bundle, we can easily start using Tor without installing and configuring any additional items. It also contains one very interesting project, a web browser ...