LATEST ARTICLES
Aug 27
Assembly language MOV instruction

In a normal Windows/Linux environment, you have heard about moving data or files. What we do is copy data from a source location to a destination. The assembly MOV instruction is very similar to....

Aug 27
GDB reverse engineering tutorial

Today, I selected an interesting topic to discuss. Here, we are going to disassemble a binary file and take a look at what it does. This process is called reverse engineering. Let's run the program....

Aug 27
How stack works in function call

The Stack in Computer Science The stack is an important concept in computer science. If you are planning to learn reverse engineering, malware analyzing, exploitation, etc., this concept is a must to....

Aug 25
Remote Command Execution

Understanding Remote Command Execution (RCE) Vulnerabilities Remote Command Execution (RCE) is a critical security vulnerability that allows an attacker to execute arbitrary commands on a remote....

Aug 25
Simple crackme tutorial for beginners

In today’s post, we’ll walk through solving a basic crackme challenge using GDB. You can also solve this challenge on a Windows platform using IDA. I found a crackme collection on GitHub, and....

Aug 25
Debugging Binaries with GDB

GDB is shipped with the GNU toolset. It is a debugging tool used in Linux environments. The term GDB stands for GNU Debugger. In our previous protostar stack0 walkthrough tutorial, we used GDB many....

PROGRAMMING ARTICLES
HACKING ARTICLES
OTHER TOPICS

Computer science

Web development

How to guides

Networking

Cryptography

ABOUT HACKSLAND

Explorer the world of cyber security. Read some cool articles on System exploitation, Web application hacking, exploit development, malwara analysis, Cryptography etc.

CATEGORIES
SOCIAL