Patsam, short for "Patsambahan" =)
Saturday, August 25, 2007
Tuesday, August 14, 2007
Other look of OSI model
Guys from Erratasec are always dishing out crisp informations about network security..
Another informative knowledge was instilled on this post about OSI model.
Hmmm ganun pala yun??! =)
Another informative knowledge was instilled on this post about OSI model.
Hmmm ganun pala yun??! =)
Saturday, August 04, 2007
Immunity Debugger is out!!
I've waited this for quiet awhile.. finally, the Immunity debugger is out fresh from the oven!!
Download it from immunity website: http://www.immunitysec.com/products-immdbg.shtml
From its website:
A debugger with functionality designed specifically for the security industry
Cuts exploit development time by 50%
Simple, understandable interfaces
Robust and powerful scripting language for automating intelligent debugging
Lightweight and fast debugging to prevent corruption during complex analysis
Connectivity to fuzzers and exploit development tools
It combines the functionalities of the WinDbg and OllyDbg and a lot more. It supports the command-line shortcuts for WinDbg and the GUI of OllyDbg. It also allows remote debugging and can show some functions graph if you want to visually check the codes. Above all, it was designed for vulnerability analysis and exploit development with emphasis on heap exploitation.
Download it from immunity website: http://www.immunitysec.com/products-immdbg.shtml
From its website:
A debugger with functionality designed specifically for the security industry
Cuts exploit development time by 50%
Simple, understandable interfaces
Robust and powerful scripting language for automating intelligent debugging
Lightweight and fast debugging to prevent corruption during complex analysis
Connectivity to fuzzers and exploit development tools
It combines the functionalities of the WinDbg and OllyDbg and a lot more. It supports the command-line shortcuts for WinDbg and the GUI of OllyDbg. It also allows remote debugging and can show some functions graph if you want to visually check the codes. Above all, it was designed for vulnerability analysis and exploit development with emphasis on heap exploitation.
Subscribe to:
Posts (Atom)