Guest Blogging at Prohack

Thanks for showing interest in my website, I hope you are some creative security guy/enthusiastic/hacker who wants to be a part of Prohack and use it as a platform to showcase his/her original research/rant/anything that caters to higher mortals.

Articles related to -
(list shamelessly ripped off from GRECON CFP)
  • Reverse Engineering and Obfuscation
  • Vulnerability Discovery, Analysis and Exploit Automation
  • Embedded Systems Security, including Smartphone Security
  • Hardware Vulnerabilities
  • Malware Creation, Analysis and Prevention
  • Web Application Security
  • Network Infiltration & Ex-filtration
  • Intrusion Detection and Prevention
  • Security and Privacy in Cloud, P2P Networks
  • Penetration Testing
  • Disclosure and Ethics
  • Digital Forensics
  • Applied Cryptography and Cryptanalysis
  • Exotic protocols (SITA anyone ?), geek stuff or anything that caters to the higher mortals.
For a sample guest article you can read this one on Anti Debugging
(I hope you get my point.)

If it catches my fancy and is devoted to the above genres, I will be more than glad to publish it with your credentials.


Rishabh Dangwal

1 comment:

  1. Sir,
    when a physical address is used as a memory address by a user program????


Need to say something ? Spell it out :)