Sourov GhoshinInfoSec Write-upsDemystifying Insecure Deserialization in PHPSerialization vs DeserializationAug 22, 20201Aug 22, 20201
Sourov GhoshinInfoSec Write-upsIKEEXT DLL HijackingExploiting it service manuallyApr 19, 20201Apr 19, 20201
Sourov GhoshinInfoSec Write-upsPrivilege Escalation in WindowsAll roads lead to SYSTEMApr 18, 2020Apr 18, 2020
Sourov GhoshVulnserver GMON command exploitSEH based buffer overflow for GMON command in vulnserver.Apr 10, 20201Apr 10, 20201
Sourov GhoshDynamic Analysis using FridaBypassing application security checks & manipulating code at runtime.Jan 18, 2020Jan 18, 2020
Sourov GhoshUnderstanding & Exploiting Stack-based Buffer OverflowsTheoretical concepts & example of Saved Return Pointer OverflowsJan 16, 20201Jan 16, 20201
Sourov GhoshAnother journey to OSCP“Every battle is won or lost before it’s ever fought.”Jan 11, 2020Jan 11, 2020