Open Security Research
Tuesday, November 4, 2014
A Brief Overview of the Google Authenticator
By Deepak Choudhary. Many application providers are considering implementing a more robust login mechanism to their applications as single...
Tuesday, September 16, 2014
hostapd-wpe: Now with More Pwnage!
By Brad Antoniewicz . A major component of hacking IEEE 802.11 wireless networks is targeting the client's system. This is becau...
Tuesday, September 9, 2014
Face Smack: A CSAW CTF Challenge
By Brad Antoniewicz . For the last couple of years, I've had the pleasure to help out with and judge NYU Poly CSAW's CTF , the l...
Tuesday, August 26, 2014
My Cousin VIMmy: A Journey Into the Power of VIM
By Melissa Augustine Goldsmith. I was cleaning up some YARA rules we have in the office. I am, if anything, a bit OCD about tabs and spac...
Tuesday, August 19, 2014
Learning Exploitation with FSExploitMe
By Brad Antoniewicz . I've been an adjunct professor at NYU Poly for almost two years now. It's been a great experience for a ...
Wednesday, July 16, 2014
KLEE on Ubuntu 14.04 LTS 64Bit
by Brad Antoniewicz . It seems like all of the cool kids nowadays are into Symbolic Execution , especially for vulnerability research . ...
Tuesday, July 8, 2014
Writing Slack Space on Windows
By Diego Urquiza. I’m a Foundstone intern in NYC office and for a project I decided to write a tool to remove file slack space. In this ...
View web version