Content-Type Attack: Dark Hole in a Secure Environment Read

Introduction Content-Type attacks are related to the vulnerabilities in client side software that are used to read the content like adobe reader, Microsoft office, Image viewer. Attackers attempt to exploit programming flaws in that code to induce memory corruption issues, resulting in …

Loggingin MySQL Read

Loggingin MySQL

mysql-logos.gif Scope: This article demonstrates logging techniques in MySQL to uncover and analyze any mischief attempts done by (outside or inside) user focusing on specific areas in database. What you will learn: In this article I am going to talk about how …

FUD through Hex Editor Heading Read

Introduction Mostly all Trojans/key loggers are detectable by the antivirus. One of the most common problems being faced is making Trojan/key loggers undetectable from the antivirus. So in this tutorial I am going to tell you how to make your Trojan undetectable …

Malware Memory Forensics Read

Introduction Memory Forensics is the analysis of the memory image taken from the running computer. In this article, we will learn how to use Memory Forensic Toolkits such as Volatility to analyze the memory artifacts with practical real life forensics scenario.Why Memory …

PHP Shells Read

PHP Shells

Hi boyz’n’girls. This is my first appearance on ClubHack, hope not the last. 😀 Anyway straight to the point. I will talk about “PHP shells”. PHP shells are used by Blackhats to maintain persistence into a compromised machine, typically a webserver. A …

Steganography over converted channels Read

Steganography and Cryptography Security and privacy have been a concern for people for centuries. Whether it is private citizens, governments, military, or business, it seems everyone has information that needs to be kept private and out of the hands of unintended third …