Malformed ELFs. How to make executable Linux files debug-resistant

Date: 29/12/2024

Plenty of anti-debugging techniques are available nowadays, but one of them stands distinctive. Its main principle is not to detect a debugger, but to prevent the app from running in it. This article explains how such a goal can be achieved using parser differentials and fuzzing. You will learn how to craft amazing ELF files that are resistant to debuggers and disassemblers but run smoothly in their native Linux environment.
Read full article →

Megadrone. Assembling a long-range and jammer-resistant hacker drone

Date: 31/08/2023

Imagine that you are sitting with your computer on an upper floor of a secure building located in the middle of a restricted zone fenced by electrified barbed wire. You feel completely safe: cameras and vigilant security personnel protect you. As of a sudden, you hear suspicious buzzing outside the window, and this sound distracts you for a few seconds. And in these few seconds, a backdoor is installed on your computer, and a hacker located 20 km from you penetrates the corporate network. Sounds fantastic? No way!
Read full article →

Poisonous fruit. How to assemble your own Wi-Fi Pineapple and put it to use

Date: 15/08/2023

In sci-fi movies, hackers often use small pocket devices, less than a cellphone in size, to hack a company’s wireless network, gain access to its servers, and steal passwords. This article gives you a chance to become one of such hackers; all you need for this is a fantastic gadget called Pineapple. Most importantly, you can assemble it yourself, and I will explain in detail how.
Read full article →