Malicious Mechanics of ELF: Shellcode, Segments & Stealth
A deep dive into how attackers exploit ELF internals to inject, persist, and execute malicious payloads on Linux systems
1493 words
|
7 minutes
Cover Image of the Post
Stealing Control with LD_PRELOAD
Explore how LD_PRELOAD can hijack Linux binaries at runtime—powerful for both reverse engineering and real-world exploitation
966 words
|
5 minutes
Cover Image of the Post
The Elliptic Curve Backdoor: A Hidden Flaw in Randomness
A deep dive into how randomness and elliptic curves intertwine—and how one subtle backdoor almost compromised it all
714 words
|
4 minutes
Cover Image of the Post