Tagged: Vulnerability

Buffer overflow attack

Buffer overflow attack

On the previous post, I introduced to you the concept of buffer overflow. On this post, I am going to guide you how to find and exploit buffer overflow vulnerability. Stack overflows are usually...

Penetration Testing in the Real World

A penetration test (pentest for short) is a method of attacking a computer’s systems in the hope of finding weaknesses in its security. If the pentest successfully gains access, it shows that computer functionality...