ELF in-memory execution

Fileless malware attacks are becoming more and more popular. Which is hardly surprising as they normally leave no trace. In this article we will not speak about program execution in Windows RAM. Instead, we will focus on GNU/Linux. Linux is dominant in the server segment, used in millions of…

ThunderDNS: How it works

Greetings! During penetration testing projects we often encounter tightly segmented networks that are almost completely isolated from the outside world. Sometimes, to solve this problem it is required of us to forward traffic through the only available protocol - DNS. In this article we will describe how to solve a…

A Loophole in the Firewall

When the Internet access is firewalled, but you badly need to transfer data, DNS tunneling comes to the rescue. Even at the strictest settings, DNS queriescan sometimes be allowed, and we can use this by responding to them from our server on the other side. The connection will be very…

Bulldog 2

Традиционную еженедельную рубрику прохождений Vulnhub продолжает виртуалка под названием Buldog 2.…