Home OffSec
  • Pricing
Research & Tutorials | OffSec
Blog

/

Research & Tutorials

Research & Tutorials

OffSec experts share cutting-edge vulnerability research, tool reviews, tutorials, virtual lab and content walkthroughs.

Aug 8, 2024

11 min read

How to Become a Cybersecurity Engineer

Learn how to become a cybersecurity engineer, including the educational paths to follow, the crucial skills and certifications needed, and more.

Read more
RegreSSHion exploit, CVE-2024-6387: A Write-Up

Research & Tutorials

RegreSSHion exploit, CVE-2024-6387: A Write-Up

In this blog post, we will be explaining the new RegreSSHion exploit, CVE-2024-6387 and how it works.

Jul 8, 2024

9 min read

AMSI Write Raid Bypass Vulnerability

Research & Tutorials

AMSI Write Raid Bypass Vulnerability

In this blog post, we’ll introduce a new bypass technique designed to bypass AMSI without the VirtualProtect API and without changing memory protection.

May 3, 2024

14 min read

Behind Enemy Lines: Understanding the Threat of the XZ Backdoor

Research & Tutorials

Behind Enemy Lines: Understanding the Threat of the XZ Backdoor

The following is an excerpt from our new module on the recent XZ Utils backdoor, CVE-2024-3094.   On Mar 29, 2024, at 12:00PM ET, Andres Freund posted on the Openwall mailing list about a backdoor he discovered in the XZ Utils package. The backdoor targeted the OpenSSH binary, allowing remote code execution on impacted machines.

Apr 9, 2024

5 min read

AI in Cybersecurity

Research & Tutorials

AI in Cybersecurity

Mixed sentiment surrounds the application of AI in cybersecurity. Join us for an examination of where AI fits into our cybersecurity toolkits.

Feb 26, 2024

9 min read

Ransomware Revealed: From Attack Mechanics to Defense Strategies

Research & Tutorials

Ransomware Revealed: From Attack Mechanics to Defense Strategies

Explore the evolution of ransomware attacks, their impact, types, and learn robust defense strategies against this escalating cyber threat.

Dec 15, 2023

8 min read

Social Engineering: The Art of Human Hacking

Research & Tutorials

Social Engineering: The Art of Human Hacking

Learn how social engineering exploits human vulnerabilities through manipulation and deception. This guide covers different tactics cybercriminals use and key strategies to protect your organization.

Dec 8, 2023

7 min read

Advanced Persistent Threats: OffSec’s Comprehensive Guide

Research & Tutorials

Advanced Persistent Threats: OffSec’s Comprehensive Guide

Explore key strategies to safeguard against Advanced Persistent Threats (APTs), focusing on prevention, response, and recovery in cybersecurity.

Nov 28, 2023

7 min read

In the Hunt for the macOS AutoLogin Setup Process

Research & Tutorials

In the Hunt for the macOS AutoLogin Setup Process

OffSec’s Csaba Fitzl shares how he reverse-engineered the macOS auto-login process, including the walls he hit, and the times he resorted to trial-and-error approaches.

Sep 23, 2022

14 min read

Introduction to Car Hacking: The CAN Bus

Research & Tutorials

Introduction to Car Hacking: The CAN Bus

The CAN bus (Controller Area Network bus) is a central network that a vehicle communicates with its components. We can think of this in regard to the fact that the vehicle has many functions that operate via electrical signals. The car has door locks, a speedometer, a gas gauge, controls for the brakes, controls for the gas pedal, and many, MANY more.

Aug 1, 2022

21 min read

Start Studying Security with SQLi

Research & Tutorials

Start Studying Security with SQLi

We previously explored how Cross-Site Scripting (XSS) makes for an excellent topic to understand the reach and impact of hacking. In this post, we’ll improve on conceptual understanding and try to help non-technical folks understand one of the core issues of information security: the fundamental ambiguity of code and data.

Jul 12, 2022

8 min read

Weaponizing and Abusing Hidden Functionalities Contained in Office Document Properties

Research & Tutorials

Weaponizing and Abusing Hidden Functionalities Contained in Office Document Properties

TJ shows us how adversaries use macro weaponization techniques to abuse hidden functionalities contained in Office document properties.

Jun 30, 2022

9 min read

What is XSS

Research & Tutorials

What is XSS

OffSec’s Jeremy Miller helps cybersecurity professionals explain hacking to laypeople using the Cross-site Scripting (XSS) vulnerability.

Apr 26, 2022

1 min read

Showing 27 - 39 of 61 entries

Join the OffSec Community!

Our community members connect, communicate and collaborate on all things cybersecurity.

By submitting this form, I agree to the processing of my personal data by OffSec as described in the Privacy Policy.