archive of tag: Security

Vulnerability write-up - "Dangerous assumptions"

Porting Doom to a payment terminal

Exploiting a stack-based buffer overflow in practice

Getting root on a Zyxel VMG8825-T50 router