Polito Inc logo
  • Services

    • All Services
    • Cyber Readiness Assessment
    • Digital Forensics
    • Incident Response
    • IDS / IPS Tuning
    • Mobile App Security
    • Penetration Testing
    • Threat Hunting
    • Web App Security
    • Risk Management
    • Retainer
    • Training
  • Industries

    • All Industries
    • Legal Sector
    • Financial Sector
    • Healthcare Sector
    • Energy Sector
    • Public Sector
  • Why Polito

  • Contact

  • About

    • About Us
    • News
    • Our Team
    • Careers
  • Blog

  • More

    Use tab to navigate through the menu items.
    • All Posts
    • SIEM
    • Threat Hunting
    • Vulnerability Assessments
    • Dark Web
    • Events
    • Digital Forensics
    • Business Continuity / Disaster Reco
    • Antivirus
    • Botnets
    • Exploits
    • Malware
    • Mobile Apps
    • Penetration Testing
    • Tools
    • Cyber Industry
    • Phishing
    • Social Engineering
    • CTF
    Search
    Return to Libc: Linux Exploit Development
    Nihaal Prasad
    • Oct 5, 2021
    • 6 min

    Return to Libc: Linux Exploit Development

    This blog post will cover how to conduct a ret2libc attack. The ret2libc technique is a tactic used in Linux exploit development that allows
    Automated Obfuscation of Windows Malware and Exploits Using O-LLVM
    Wade Ma
    • Mar 3, 2020
    • 9 min

    Automated Obfuscation of Windows Malware and Exploits Using O-LLVM

    Today’s malware authors and exploit developers have automated methods of obfuscating their software, When these techniques are combined with
    Analysis of a Romanian Botnet
    Ian Duffy
    • Apr 1, 2015
    • 8 min

    Analysis of a Romanian Botnet

    Recently I noticed some strange entries in our web server log files. Specifically, someone was trying to exploit our servers using the Shell
    Running Metasploit Shellcode in a Process
    Ian Duffy
    • Mar 23, 2015
    • 3 min

    Running Metasploit Shellcode in a Process

    Thus I decided that I would need to execute the shellcode in a new process. This should have the effect of freeing any memory used by meterp
    Contact Us
    Our Address

    5015 Observer Ln

    Woodbridge, VA 22192

    info@politoinc.com

    Call Us

    Tel:  571-969-7039

    • White LinkedIn Icon
    • White Facebook Icon
    • White Twitter Icon

    © 2022 by Polito, Inc. All rights reserved. Privacy Policy.