Polito Inc logo
  • Services

    • All Services
    • Cyber Readiness Assessment
    • Digital Forensics
    • Incident Response
    • IDS / IPS Tuning
    • Mobile App Security
    • Penetration Testing
    • Threat Hunting
    • Web App Security
    • Risk Management
    • Retainer
    • Training
  • Industries

    • All Industries
    • Legal Sector
    • Financial Sector
    • Healthcare Sector
    • Energy Sector
    • Public Sector
  • Why Polito

  • Contact

  • About

    • About Us
    • News
    • Our Team
    • Careers
  • Blog

  • More

    Use tab to navigate through the menu items.
    • All Posts
    • SIEM
    • Threat Hunting
    • Vulnerability Assessments
    • Dark Web
    • Events
    • Digital Forensics
    • Business Continuity / Disaster Reco
    • Antivirus
    • Botnets
    • Exploits
    • Malware
    • Mobile Apps
    • Penetration Testing
    • Tools
    • Cyber Industry
    • Phishing
    • Social Engineering
    • CTF
    Search
    Return to Libc: Linux Exploit Development
    Nihaal Prasad
    • Oct 5, 2021
    • 6 min

    Return to Libc: Linux Exploit Development

    This blog post will cover how to conduct a ret2libc attack. The ret2libc technique is a tactic used in Linux exploit development that allows
    Antivirus ... for Linux
    Fred Mastrippolito
    • Apr 6, 2015
    • 2 min

    Antivirus ... for Linux

    What antivirus is best? That's a question that everyone seems to be asking these days. Antivirus is a useful tool for detecting known ma
    Contact Us
    Our Address

    5015 Observer Ln

    Woodbridge, VA 22192

    info@politoinc.com

    Call Us

    Tel:  571-969-7039

    • White LinkedIn Icon
    • White Facebook Icon
    • White Twitter Icon

    © 2022 by Polito, Inc. All rights reserved. Privacy Policy.