OUR LATEST RESEARCH
CSRF And Unsafe Arbitrary File Upload In NextGEN Gallery Plugin (2.0.77.0) For WordPress
1 Introduction Please note the vulnerability detailed in this blog article was first discovered on Monday 9th March 2015, disclosed and discussed with the company concerned on March 10th and a patch was released on [...]
Windows Inline Function Hooking
Hooking can be used by legitimate software for reverse engineering, for example, to examine the user mode function calls that a malicious program is making. It can also be used by a malicious program to [...]
Vulnerability Discovery Via 'Fuzzing'
Why would you fuzz? People fuzz for many reasons, depending on the industry they are in, from reliable assurance through to testing and validation. In security research, our primary goal is to discover potential vulnerabilities [...]
DLL Injection: Part Two
In a previous blog post I gave a high level overview of DLL injection, what it is used for and how it might be achieved. More than one method exists to get our code into [...]
DLL Injection: Part One
A High Level Overview DLL injection is a technique that can be used by legitimate software to add functionality, aid with debugging, or reverse engineer software running on a Windows PC. It is also often [...]