Search
Exploit Development
Mastering exploit development allows hackers to create custom tools to bypass modern defenses, especially when standard exploits are ineffective.

Metasploit Basics, Part 11: Exploiting Fileformat Vulnerabilities in MS Office
Welcome back, my fledgling hackers! As the operating system developers become more and more security conscious, operating system exploits...
2 min read
7,177 views


Web App Hacking, Part 6: Exploiting XMLRPC for Bruteforcing WordPress Sites
WordPress is the world's most widely used Content Management System (CMS) for websites, comprising almost 28% of all sites on the...
4 min read
24,389 views


Hackers-Arise Gets International Recognition for Exploiting SCADA System Vulnerability
October 25, 2016, Voice of America (VOA) News (voanews.com) ran an article about the vulnerability of SCADA/ICS systems. In that article...
1 min read
1,287 views

Reverse Engineering Malware, Part 3: IDA Pro Introduction
Welcome back to my Reverse Engineering Malware course! This course is designed for those of you who want to ascend to the pinnacle of...
6 min read
56 views


Exploit Development, Part 3: Finding Vulnerabilities by Fuzzing with Spike
Often, as part of the exploit development process, we will want to test an application for vulnerabilities, especially buffer overflows....
6 min read
8,258 views


Metasploit Basics, Part 8: Exploitation with EternalBlue
Welcome back, my aspiring hackers! The Metasploit framework has become a multipurpose pentesting tool--but at its heart--it's an...
3 min read
34,214 views

Exploit Development, Part 2: Writing a Simple Buffer Overflow
I. Introduction In the previous lesson in this module, we explored the basics of buffer overflows. We defined buffer overflows and looked...
6 min read
3,004 views

Browser Exploitation Framework (BeEF), Part 1
There are multitude of ways to exploit a target's system. Newbie hackers often focus on the operating system or applications, but few...
4 min read
8,531 views

How to Find the Right Exploit for the Job
This tutorial is designed to help you find and use exploits that will work against known vulnerabilities. As you already know, there is...
4 min read
1,642 views