Jan KlusáčekOct. 21, 2024
[-]

Format String Vulnerability

Since the late 1990s, the vulnerability of format strings has been known to the public and is still used to this day. When exploited, an attacker can modify memory and even execute custom code in addition to reading memory. This article discusses the principle and possibilities of exploiting format string vulnerabilities, particularly in the C and C++ languages. The possibilities of exploiting the vulnerability are described in depth, and the auxiliary techniques used by the attackers are presented. The article also explores methods to protect against this vulnerability and includes examples from various programming languages.

Stanislav KlubalAug. 30, 2019
[-]

RFID According to Frequency Range - Do You Know What You Are Dealing With?

RFID technology is a common part of our daily lives. Where do we come into contact with it and what are the most common risks? This article lists selected attack vectors and outlines real everyday situations in which we can encounter fraud in the RFID environment. The main goal of this article is an introductory and brief division of RFID technology according to the frequency band in which the actual communication takes place, including the primary areas of use.

Jan. 1, 2019
[-]

Services

ARICOMA a.s., the security company behind the HackingLab project, offers services in the field of security assessment such as penetration testing, social engineering or red teaming.