Binary Exploitation Docker Environment
Setting Up Pwn Environment Lab with Docker Reverse Engineering and binary exploitation require a well-configured environment with the right tools. Learning binary exploitation requires to learn o...
Setting Up Pwn Environment Lab with Docker Reverse Engineering and binary exploitation require a well-configured environment with the right tools. Learning binary exploitation requires to learn o...
Why Databases Are Important In Offensive Security Databases get often overlooked by beginners in cybersecurity. Databases are often critical targets and play a huge role in organization’s IT infra...
C2 Framework Advanced persistent threat (APT) groups and offensive security professionals rely on C2 (Command and Control) frameworks to remotely manage compromised systems. A C2 framework provide...
Callme 64 bit Writeup From challenge description You must call the callme_one(), callme_two() and callme_three() functions in that order, each with the arguments 0xdeadbeef, 0xcafebabe, 0xd00df...
Offensive Security Playground As i dive more into offensive security I realised that I am going to need a Red Team lab that simulates a real-world enterprise environment. I’m excited to start bu...
Building Basic Command and Control Server In order to understand how c2 servers work, I decided to build my on c2 in order to understand the internals of command and control servers. After a few w...
Rop Emporium Split hint I’ll let you in on a secret: that useful string "/bin/cat flag.txt" is still present in this binary, as is a call to system(). It’s just a case of finding them and chaining...
UMDCTF Gambling pwn challenge About binary pwn checksec gambling [*] '/home/hacker/REPO/binexp/comp/umdctf/gambling/gambling' Arch: i386-32-little RELRO: Partial RELRO Stack:...
Protostar Stack Writeups Stack 0 GOAL : Modify a variable 0x08048405 <+17>: lea eax,[esp+0x1c] 0x08048409 <+21>: mov DWORD PTR [esp],eax 0x0804840c <+24>: call 0x804830...
Get Offset to EIP ragg2 -P 100 -r AAABAACAADAAEAAFAAGAAHAAIAAJAAKAALAAMAANAAOAAPAAQAARAASAATAAUAAVAAWAAXAAYAAZAAaAAbAAcAAdAAeAAfAAgAAh r2 ret2win32 [0x08048430]> doo File dbg:///home/hacker/...