Recent posts
About Command and Control Server (C2)
Command and control servers are the primary tools cyber threat actors have in their arsenal to launch and control cyb...
Rangoon CTF Write-up (Reverse Engineering)
cmp checks if edi == 1 or edi != 1 and sets ZF (zero flag). We know that argc (argument counter) is stored in edi...
Ramada CTF Write-up (Reverse Engineering)
The program check argc value and jumps another branch. If argc value is equal to 1, program prints insturactions; if ...
Pwn101 - TryHackMe CTF Write-up
This medium level CTF covers buffer overflow, Return to Win, Integer Overflow, GOT overwrite, bypassing mitigations...
Dear QA - TryHackMe CTF Write-up
We try buffer overflow directly, because why not? After checksec we can decide our attacking vector....
Buffer Overflow Protection - Stack Canary
Stack canaries or security cookies are randomly assigned or tell-tale parts added to binary. It aims to protect from ...
Pickle Rick - TryHackMe CTF Writeup
Check ports with nmap. We found http and ssh port in target server; http port exist so there should be a website...
Moneybox CTF Write-up
We launch target machine and our kali and opened terminal as root. Check ifconfig and grab your ip address and start ...