How to ROP exploit?

In the last blog I attempted to hack a server (with permission, naturally) and discovered it had a debugger running that gave me a foothold. However I couldn’t get full control of the system without a skill upgrade in the realm of return-oriented programming (ROP) chaining.

Read More
Configuring SSH public key Authentication

SSH public key authentication is far more secure than password authentication. Think of your public key as the equivalent of a 500+ character password. SSH or Secure Shell is a cryptographic network protocol used to remotely operate servers and network devices.

Read More
LARG*netComment