Learn emergency response techniques to detect rootkits and hidden processes in Linux systems. This article covers methods of process and file hiding using rootk
This article provides an in-depth analysis of exploiting a foreign company's internal network. Key points include identifying vulnerabilities using Weblogic and
This article discusses the audit process for a YueYuCMS source code leak, focusing on the arbitrary file deletion vulnerability. It covers the analysis and test
Explore in-depth shellcode analysis techniques used in a Red Team phishing sample. Learn about automated simulation tools like Speakeasy, PE file detection, and