Title
The Path To Ring-0 (Windows Edition)
Published date
16/Apr/2018
Last Updated Date
16/Apr/2018
Description

Presentation on Windows Kernel Exploitation providing insights into common Windows kernel exploitation techniques and the current state of kernel mitigation. Presented at Insomnia Security's internal Security conference known as Roachcon (2017).


Title
Defeating Virtual Keyboard
Published date
09/Dec/2008
Last Updated Date
09/Dec/2008
Description

Around mid of 2005, I was a bit intrigued to write a proof-of-concept (PoC) keylogger to capture text input events fired using Virtual Keyboards (VK). The PoC keylogger was publicly released on 5th Aug 2005 to demonstrate the hack for a particular banking site. However, this PoC underlines the fact that any site which uses similar VK or OSK can be defeated. This paper was publicly released by Hakin9 magazine in their Nov 2007 issue and as per the contract I was allowed to publish the free copy after six months of their release.


Title
Event Correlation & Need for SIM
Published date
04/Nov/2005
Last Updated Date
04/Nov/2005
Description

Between 2003 till 2005, Security Information Management (SIM or SEIM) products were new for the industry and was in the start-of-the-art stage which has evolved significantly over time. Back then, I was quite intrigued by such products which got me write a paper on it. This whitepaper was originally published on Wipro Technology's website while I used to work for Wipro. However, the official link to the paper is currently broken, therefore, making it available here.


Title
Multiple Articles (archived)
Published date
01/Jul/2004
Last Updated Date
01/Jul/2004
Description

Following are list of very old articles which are archived and are removed from this website. If you need a copy of it, feel free to email me. Alternatively, you may google for it's title to get an online copy archived elsewhere.

  • Security Testing Demystified - (Published: 19-Jan-2006)
  • Fake FBI Worm Exposed - (Published: 25-Feb-2005)
  • Antivirus Evasion Techniques & Countermeasures - (Published: 03-Dec-2004)
  • Demystifying Penetration Testing - (Published: 26-Aug-2004)
  • Demystifying Google Hacks - (Published: 01-Jul-2004)
Download