Metasploitable3 CTF Writeup
Hello,
Hello,
Hello all.
Hello everyone. LAMP Security CTF7 was created by Mad Irish. You can find it on Vulnub or on root-me.
Hello Friend,
LAMP security CTF5 is a funny and easy CTF with a lot of vulnerabilities. You can find info about it on Vulnhub.com.
Hi everyone. This is my solution for LAMP security CTF4. This CTF is very easy, you can download it from Vulnhub.com or play online on root-me.org. I did it ...
Let’s start by enumerating all the services on the machine with a TCP scan:
I had some problems the last week and couldn’t publish this writeup I wrote in Decembre, let’s start by enumerating all the service on the machine with a TCP...
Hello, I wrote the writeup for Book on the blog of my team!
Let’s run a full TCP scan with NMAP in order to enumerate all the available TCP services:
Let’s start with NMAP:
Hello everybody, this is my first macOS malware analysis, I took a sample from malwarebazaar and tried to reverse it, the sample was uploaded by Cryptolaemus...
In the previous blog post we have seen how to perform a shellcode process injection by finding a target process PID using several WinAPIs, in that case all t...
In the previous blog post we have seen how to develop a Shellcode Process Injection in Rust; the described Process Injection flow relies on several WinAPIs: ...
Malware development is essential when performing activities like Red Teaming, Adversary Emulation and Network Penetration Testing, the operator can use custo...
This is my first malware blog post, hope it will be useful to someone, I’ll not go deeper in the malware details because there are plenty of detailed reports...
Sometime ago a friend of mine sent me a suspicious email containg a zip file with an xls, at the time I didn’t focus too much on what the file does and simpl...
After my previous blog posts about DVIA v2 Anti-Debug and Frida with Swift some guys asked me about the URL Runtime Manipulation challenge in DVIA v2. I wil...
Usually when reversing an iOS Application, it’s common to see methods and strings that can help an attacker to figure out how the application works. When I’...
Frida is a dynamic binary instrumentation framework that has been around for a while. In a nutshell, Frida allows reverse engineers to perform activities suc...
This is my solution to bypass anti-debugging checks on Damn Vulnerable iOS Application v2. While reversing the application, I noticed the presence of two an...
In the previous blog post we have seen how to perform a shellcode process injection by finding a target process PID using several WinAPIs, in that case all t...
In the previous blog post we have seen how to develop a Shellcode Process Injection in Rust; the described Process Injection flow relies on several WinAPIs: ...
Malware development is essential when performing activities like Red Teaming, Adversary Emulation and Network Penetration Testing, the operator can use custo...
In the previous blog post we have seen how to perform a shellcode process injection by finding a target process PID using several WinAPIs, in that case all t...
In the previous blog post we have seen how to develop a Shellcode Process Injection in Rust; the described Process Injection flow relies on several WinAPIs: ...
Malware development is essential when performing activities like Red Teaming, Adversary Emulation and Network Penetration Testing, the operator can use custo...
Some time ago I analized this ipcam with my friend Dzonerzy:
In this blogpost, I’ll explain how to bypass NX using mprotect() in order to make the stack executable.
Hello everybody, this is my first macOS malware analysis, I took a sample from malwarebazaar and tried to reverse it, the sample was uploaded by Cryptolaemus...