Download our Latest Industry Report – Continuous Offensive Security Outlook 2026

A simple and effective way to detect Broadcast Name Resolution Poisoning (BNRP)

BNRP hero

A natural question that arises after an organization experiences a BNRP attack is “How can this be prevented?” The answer is simple on paper. To completely mitigate the risk, legacy Broadcast Name Resolution protocols should be disabled by policy. This is easier said than done, especially on large networks where the necessary data flows of […]

Extending LLVM for Code Obfuscation (2 of 2)

In part one, we covered setting up a development environment for working with LLVM and developed a simple pass that inserted junk code into binaries during compilation to hinder signature-based detection and manual reverse engineering efforts. In this article, we develop a more complex pass that automatically encrypts string literals during the compilation process by […]

Extending LLVM for Code Obfuscation (1 of 2)

Part one of this article covers the necessary background on LLVM, setting up a development environment, and developing an LLVM pass for junk code insertion in an attempt to generate unique polymorphic binaries.