Latest Posts - Page 2

May 13

The inevitable future of WiFi

Author: TheXero | Category: blog

But here's the kicker, WiFi isn't just about checking your Instagram feed or sending off that last-minute report. Nope, it's way bigger than that. Businesses are ditching those clunky on-site servers faster than you can say `cloud computing.`


Read More
May 07

WiFi Attacks Specialist Course

Author: TheXero | Category: blog

Our WiFi Attacks Specialist course is designed to take a new comer to WiFi to reach the status of WiFi Penetration Tester in the quickest time possible. The course features an interactive lab environment, turning the taught theory into practical hands-on experience with our world-class lab environment.


Read More
Nov 12

Building A Compact XOR Encoder

Author: TheXero | Category: blog

The majority of memory corruption exploits that exist, have some form of input character limitation. To get around these limitations, you have what is known as an encoder. By encoding the input ...


Read More
May 09

Worldmail Exploit

Author: TheXero | Category: exploit-development

The first public exploit we released was for the Eudora Qualcomm IMAP server commonly known as Worldmail. This exploit was classified as a Structured Exception Handler (SEH) buffer ...


Read More