Beware: A New Approach To Cyber Security That's Not Safe For Coders

Hi there! So this post will be the first in a series that focuses on an interdisciplinary approach to cyber security- with an emphasis on finance.  The series of posts will address the growing evidence that security can only be achieved through a thorough, well-rounded understanding of all the issues that play a role in cyber security.  Thanks for reading, and I hope you enjoy!              

Gera's Insecure Programming Format String #1

A well-known set of vulnerable programs to practice exploitation can be found at gera’s insecure programming. I will go through several challenges over the coming weeks. Ideally, I want to complete them all. Let’s see how far I can go. In this post I will go over how to solve format string #1 (fs1.c).

HowTo: Metasploit Autopwn Quick Guide

  1. Run metasploit:

Weaponizing a XSS vulnerability.

In which we weaponize an XSS bug in Frog CMS 0.9.5

iCTF Overview

In early December, Poly’s Brooklynt Overflow participated in UCSB’s annual iCTF.