A New Consultants First Security Conference

A New Consultant’s 1st Con – Wild West Hackin Fest – Way West 2021

Last month, I found myself Googling: Is weed legal in Nevada?  This was the day after arriving in Reno for Wild West Hacking Fest – Way West 2021.  I kept noticing that the hotel smelled like it from the moment we arrived. I was attending one of the first security conventions to have an in-person …

A New Consultant’s 1st Con – Wild West Hackin Fest – Way West 2021 Read More »

Hello World Payload

Linux X86 Assembly – How to Make Our Hello World Usable as an Exploit Payload

Overview In the last two tutorials, we built a Hello World program in NASM and GAS for x86 assembly.  While this can help us learn x86 assembly, it isn’t viable as a payload for use in exploits in its current form.  Today’s blog will look into what those issues are, how they impact the code’s …

Linux X86 Assembly – How to Make Our Hello World Usable as an Exploit Payload Read More »

AppSec Cheat Code: Shift Left, Shift Right, Up, Down & Start

Seamless and unobtrusive security is the future. We are huge advocates of shifting left and moving security testing earlier in the development process. Leif Dreizler wrote a great article suggesting that not only do we need to shift security left, but shift engineering right. I agree, but why stop there. We all need to cultivate …

AppSec Cheat Code: Shift Left, Shift Right, Up, Down & Start Read More »

Linux X86 Assembly - How to Build a Hello World Program in NASM

Linux X86 Assembly – How to Build a Hello World Program in NASM

Overview A processor understands bytecode instructions specific to that architecture.  We as humans use mnemonics to make building these instructions easier than remembering a bunch of binary codes.  These mnemonics are known as assembly instructions.  This is one of the lowest levels of programming that can be done.  This programming is a bit of a …

Linux X86 Assembly – How to Build a Hello World Program in NASM Read More »

A Hacker’s Tour of the X86 CPU Architecture

A Hacker’s Tour of the X86 CPU Architecture

Overview The Intel x86 CPU architecture is one of the most prolific CPU architectures for desktops, laptops, and servers.  While other architectures exist and are even taking some market share with mobile devices such as smartphones and even Apple begin including its ARM M1 chip in newer Macbooks and Mac Mini, this one still stands …

A Hacker’s Tour of the X86 CPU Architecture Read More »

Three

Three Excellent API Security Practices Most People Neglect

We are very much in the age of APIs. From widely-used single-purpose products like Slack to cloud-based solutions like Amazon Web Services (AWS) and Microsoft Azure, APIs are used to drive business processes in all kinds of industries, every day. For tech companies, whether you’re doing a monolithic back-end, containerized microservices, or serverless architecture, the …

Three Excellent API Security Practices Most People Neglect Read More »

Scroll to Top