Poor Man's Unbreakable Encrypted TCP Tunnel

  • Posted on: 7 March 2015
  • By: siteadm

Since it has been long time I didn't write something, I decided to find something to write about. I was planning to write about one of my findings while I was doing some penetration testing for a customer. I found an interesting vulnerability in a ColdFusion written web site of the client, it took me quite some time to successfully gain full control of the server by leveraging the bug. This portal was in use for long time and a lot of people have tested it and checked it for vulnerabilities, but it seems that all of them missed my finding.

Tiny Malware PoC: Malware Without IAT, DATA OR Resource Section

  • Posted on: 13 August 2014
  • By: siteadm

Have you ever wondered about having an EXE without any entry in IAT (Import Address Table) at all? Well, I knew that it's possible, but never saw an actual exe file without IAT entry. So I developed an application which is 1,536 bytes and still does basic annoying malware things. So to summarize, this tiny app:

- Enumerates following APIs:


Freetime + RFID Reader = Linux RFID Pluggable Authentication Module

  • Posted on: 7 August 2014
  • By: siteadm

Hey everyone! I had some freetime last night and I noticed that I have several RFID cards and and RFID reader and I almost do nothing with them. After thinking a little bit about what I can do with RFID reader, I came up with an idea! NFC RFID Linux PAM (Pluggable Authentication Module)! So next time for logging into my computer, user should have an RFID card, otherwise, even entering correct username+password combination, will not work.

Basic Secure Web Application Programming Practices

  • Posted on: 6 August 2014
  • By: siteadm

When you learn that a company web server compromised because of a small programming mistake in PHP and it was possible to stop the attack by calling a function, you will want to learn more about all those "function calls".
Basically, in this post, I'll talk about possible attacks to web applications and how to stop them.

Shellcode - Module Unloader

  • Posted on: 3 August 2014
  • By: siteadm

Have you ever dealt with malwares that inject their DLLs into other processes? Sometimes they inject their DLL into some critical processes like csrss.exe (like recent Soraya malware), you are in middle of a hundred breakpoint placed Ollydbg, several IDAs loaded and you are deep in analysis, you just can't restart computer and you can't let malware running in csrss.exe. So I decided to write a basic shellcode to unload any given DLL (module), so I can inject this shellcode into infected process to unload malware or any DLL.

Basic Smart Card Console Application

  • Posted on: 1 June 2014
  • By: siteadm

I had to run some tests on some smart cards I received recently in Debian. I did some research to find a very simple, very basic command line code, compilable and runnable in Debian, which will run HEX commands in smart card and show the results again in hex and .
So I wasn't able to find such a code and I decided to write my own. From now on, you can use it too:

Android Browser Dialog with Root Support

  • Posted on: 19 April 2014
  • By: siteadm

I was in the middle of coding some application for android and I needed a File/Folder browsing dialog. But I also needed access to /data and other sensitive folders. So I started searching internet, but I didn't find anything useful. Anyway, I decided to write my own. For initial code, I used sample project from here

I started expanding it, made some changes to it, added images for files and folders, added root access features, added known filetype icons, etc.