HardenWall Systems
Operational
Restricted Access Platform
Products
GeoInt Platform E2E Encrypted AI Powered SAST
About UsBlogOur Services
OFFENSIVE SECURITYAutomotive Security TestingIoT & Firmware TestingUAV & Drone SecurityAPPLICATION SECURITYWeb & Mobile SecurityTrainingsLinux Usermode Exploitation 101
Contact Us
Intel Feed

Category: Blog

Offensive Security for Embedded Systems, Automotive Platforms, UAVs, and Connected Technologies

All Blog CVEs Exploit Dev Exploits Free Reports FREEPAGES
BLOG

Stack Overflows for Beginners — Level 5

Welcome again to the Stack Overflows for Beginners series! In this post, we continue with the Level 5 binary and work on exploiting it to get the next flag...

BLOG

Stack Overflows for Beginners — Level 4

Welcome again to the Stack Overflows for Beginners series! In this post, we continue with the Level 4 binary and work on exploiting it to get the next flag....

BLOG

Linux Usermode Exploitation 101

Introduction The aim of this course is to train students in the fundamentals of Linux usermode exploitation. You will learn how stack memory works, how...

BLOG

Stack Overflows for Beginners — Level 3

Welcome again to the Stack Overflows for Beginners series! In this post, we continue with the Level 3 binary and work on exploiting it to get the next flag....

BLOG

Stack Overflows for Beginners — Level 2

Welcome again to the Stack Overflows for Beginners series! In this post, we continue with the Level 2 binary and work on exploiting it to get the next flag....

BLOG

Stack Overflows for Beginners — Level 1

In this post, we’ll explore the fundamentals of exploiting stack-based buffer overflows using the “Stack Overflows for Beginners: 1.0.1” challenges from VulnHub. We’ll walk through analyzing...

BLOG

Walkthrough: Config Editor app in Android

Affected Product Config Editor Affected version 1.0 CVE ID N/A Vulnerability Type Remote Code Execution Type MOBILEAPPS DescriptionCVE-2022-1471 identifies a critical unsafe deserialization vulnerability within...

BLOG

CVE-2023-37152: Online Art gallery project 1.0 – Arbitrary File Upload (Unauthenticated)

Affected Product Online Art gallery project Affected version 1.0 CVE ID CVE-2023-37152 Vulnerability Type Arbitrary File Upload (Unauthenticated) Type WEBAPPS Description Online Art Gallery Project...

BLOG

CVE-2023-36256: Online Examination System Project 1.0 – Cross-site request forgery (CSRF)

Affected Product Online Examination System Project Affected version 1.0 CVE ID CVE-2023-36256 Vulnerability Type Cross-site request forgery (CSRF) Type WEBAPPS Description The Online Examination System...

BLOG

CVE-2020-29168: Online Doctor Appointment Booking System PHP and Mysql 1.0 – ‘q’ SQL Injection

An SQL injection vulnerability was discovered in PHP Doctor Appointment System by me on 11/16/2020. In ‘getuser.php’ file, GET parameter ‘q’ is vulnerable. The vulnerability...

Access from the European Union/UK is restricted

This system is not offered to EU, UK, or EEA users.

This system is a non-EU research prototype and is not offered to individuals or entities within the European Union, United Kingdom, or European Economic Area. No services are provided to users in these jurisdictions, and no personal data from EU/UK/EEA data subjects is intended to be processed.