Security

Introduction to Reverse Engineering and Radare2

What is Reverse Engineering Reverse Engineering (RE) is an ad hoc and creative process of extracting the knowledge of design and implementation information from anything we use in reality. Similarly, reversing a software is a practice of analysing the software to...

read more

Introduction to Heap Internals

In this post we will cover a few essential topics of Heap Memory. We will learn about the heap creation, the structure of heap memory and different exploitation techniques. This post is mainly based on glibc's heap implementation. We recommend reading “Doug Lee malloc...

read more

Discovering Vulnerabilities with AFL Fuzzer

This article covers the topic Fuzzing with American Fuzzy Lop (AFL), a powerful fuzzer to find unknown/known vulnerabilities in a software. This should be a good start for any security researchers or a passionate developer who love hunting bugs for fame and profit....

read more

Memory Corruption Vulnerabilities

In the previous post, some brief information on analyzing memory corruption issues was given. In the following post, a few prevalent issues in this category that can lead to security impacts will be addressed....

read more

Why Is My Software Vulnerable?

Vulnerability Analysis: Over the past few years, our team has manually analyzed numerous vulnerabilities in open source software. Be it a critical design flaw that eventually lead to the retrieval of encrypted mails in a widely used mail client's add-on that send and...

read more

Let us know how we can help you

Chantilly Office, USA

4437 Brookfield Corporate Drive, Suite 101 Chantilly, VA USA 20151

+1 703 956 7410

Hyderabad Office, India

1-63-5-8B, Kavuri Hills, Jubilee Hills, Hyderabad-500033

+91 40 40325500

@2018 Loginsoft
All rights reserved