PinnedOfri OuzanExploring the World of Cybersecurity: A Collection of My Blog Posts, Researches, and Open-Source…IntroductionJul 23, 2023Jul 23, 2023
Ofri OuzanChatGPT Advises on Using Insecure URLsI requested ChatGPT to generate a Dockerfile script for installing a specific version of the Glibc package (version 2.39), which required…May 22May 22
Ofri OuzanPart 6 — My Talk “The Evolution Of Exploiting Memory Vulnerabilities In Linux”This one is going to cover the content of the talk I presented in OWASP Washington DC 2023 and DeepSec Austria, Vienna 2023 about “The…Nov 19, 20231Nov 19, 20231
Ofri OuzanPart 4 — The Evolution of Attack TechniquesThis section will delve into the evolution of exploit creation. Now that we’re familiar with the security mechanisms acting as barriers…Nov 16, 2023Nov 16, 2023
Ofri OuzanPart 3 — Kernel Level Security MechanismsThis part of the research is focussed on explaining the evolution of the development of Security Mechanisms in Linux. I created a timeline…Nov 15, 2023Nov 15, 2023
Ofri OuzanPart 2 — Compiler Level Security Mechanisms (GCC)This section covers information about security mechanisms at the compiler level. It provides detailed information about each security…Nov 14, 2023Nov 14, 2023
Ofri OuzanDissecting and Exploiting CVE-2021–41773 and CVE-2021–42013In this comprehensive blog post, we will explore two common vulnerabilities in Apache HTTPD: CVE-2021–41773 and CVE-2021–42013. If you’re…Aug 2, 2023Aug 2, 2023
Ofri OuzanMatch Containers PIDs With Host PIDsWhile adding support for containers in the Python tool I developed, called MI-X, which checks exploitability for “Famous Vulnerabilities”…Jul 4, 2023Jul 4, 2023