George Nicolau

George Nicolau

George is the Reverse Engineering Master

Command Execution Vulnerability in Bash

Posted by on in Vulnerabilities
Introduction Over the past weeks there has been a global hype over a number of vulnerabilities affecting the GNU Bash application. These vulnerabilities are classified under CWE-78 (OS Command Injection) which describes vulnerabilities that allow the construction of OS commands using externally con...
Last modified on Continue reading
Hits: 4879 Comments
Rate this blog entry:
0

Bypassing Comodo Internet Security

Posted by on in Reverse Engineering
This post discusses the issues that arise from the reliance on user-mode control flow monitoring techniques for the implementation of systems such as Host Based Intrusion Detection Systems, Sandboxes, Function Tracers, etc. It focuses on a single HIPS product offered by Comodo [1], a well respected ...
Last modified on Continue reading
Hits: 3121 Comments
Rate this blog entry:
0

Silensec Cyprus HQ

Silensec Africa

Feel free to contact us if you have any problems.

Silensec UK

Feel free to contact us if you have any problems.