Happy Monday fellow Linux geeks and Open Source enthusiasts! In this week's newsletter we dive deeper into the topic of anti-debugging in Part 2 of our Hacker's Corner: Complete Guide to Anti-Debugging in Linux series which focuses on self-modifying code, and Part 3 which explores breakpoints.
We also examine web application vulnerability fundamentals and how they may or may not be affecting your system. Hope you enjoy!
Yours in Open Source,
Hacker's Corner: Complete Guide to Anti-Debugging in Linux - Part 3In the previous part of our Hacker's Corner series, we covered anti-debugging using a trivial self-modifying code. Here, instead of blocking debugging completely, we will detect various debugger-induced activities. Learn more about hacker s corner complete guide to anti debugging in linux part 3 |
Complete Guide to Vulnerability BasicsIn order to grasp what vulnerabilities you may be facing, it is best to start with the basics. Throughout this article, we will go through web application vulnerability fundamentals and how they may or may not be affecting your system. |
Hacker's Corner: Complete Guide to Anti-Debugging in Linux - Part 2This article dives deeper into the topic of anti-debugging in Linux, focusing on the process of self-modifying code. Learn more about hacker s corner complete guide to anti debugging in linux part 2
|