George Nicolau

George Nicolau

George is the Reverse Engineering Master

Command Execution Vulnerability in Bash

Posted by on in Vulnerabilities
Introduction Over the past weeks there has been a global hype over a number of vulnerabilities affecting the GNU Bash application. These vulnerabilities are classified under CWE-78 (OS Command Injection) which describes vulnerabilities that allow the construction of OS commands using externally con...
Last modified on Continue reading
Hits: 9277 Comments
Rate this blog entry:
0

Bypassing Comodo Internet Security

Posted by on in Reverse Engineering
This post discusses the issues that arise from the reliance on user-mode control flow monitoring techniques for the implementation of systems such as Host Based Intrusion Detection Systems, Sandboxes, Function Tracers, etc. It focuses on a single HIPS product offered by Comodo [1], a well respected ...
Last modified on Continue reading
Hits: 6208 Comments
Rate this blog entry:
0

USA

 

Canada

UK

Cyprus

Kenya

  • Address: Eldama Park, Tsavo Wing, 2nd floor, Eldama Ravine Road, Westlands, Nairobi
  • Email: info@silensec.com
  • Tel.: +254 (0) 20 8071814