Corey Gardnercoreyscorner.hashnode.dev·Mar 25, 2024Intro to x86 Hacking: Function ProloguesHacking is like doing a magic trick, it impresses the uninitiated precisely because they don't understand what they are seeing. The hacker is a systems thinker, an exceptional one who knows the rules of the system so well that it seems like they are ...assembly x86/64 assembly programming
Damon Vesseydamonvessey.com·Feb 18, 2024What are registers?You can think of registers as variables the CPU uses for faster data access than accessing data from memory. There are only a few registers the CPU has, so where do we store the rest of our variables in our programs? The stack and the heap. We can se...70 readsFrom Beginner to Smashing the Stack for Fun and Profit and Beyondgdb
ghouti_yelles0xor1day.hashnode.dev·Sep 5, 2023Mastering Binary Exploitation: A Dive into CybersecurityIn the ever-evolving landscape of cybersecurity, mastering binary exploitation is a critical skill. It's the art of identifying and exploiting vulnerabilities in compiled software programs, a skill often used by both ethical hackers and malicious act...1 likeLinux
Talsonripp3rdoc.hashnode.dev·Aug 25, 2023SigReturn-Oriented Programming (SROP) Technique — Binary ExploitationReturn-Oriented Programming (ROP) stands as a prominent technique employed in the realm of exploitation, effectively circumventing security mechanisms such as NX/DEP. By delving into the intricacies of the ROP technique, an array of innovative "retur...7 likes·444 readsreturn oriented programming
Nick GNONLONFOUNkingnl.hashnode.dev·Jul 6, 2023From zero to hero: Pwn - 1Salut chers passionnés de cybersécurité ! Comme promis dans mon précédent article, nous allons démarrer la série d'articles sur le pwn. Alors ... Qu'est-ce-que le pwn ? Le pwn est un terme employé en hacking pour désigner l'action de dominer, de conq...1 like·69 readspwn
HodlToM00Nhodltom00n.hashnode.dev·Mar 2, 2023GryphonCTF 2022: ret2secret WriteupGCTF or Gryphon CTF is a Capture-The-Flag event hosted by Cybersecurity students from Singapore Poly. This write-up provides a solution to solve one of the binary exploitation, a.k.a PWN challenges, titled ret2secret. Approach The challenge features ...71 readsCTF
WarrenMuforOpen Source Community Kampalablog.oscakampala.org·Jan 8, 2023C vs Rust cyber security programming. Which one to choose.Both C and Rust are programming languages that can be challenging to learn, especially if you are new to programming. However, they are both powerful languages that are widely used in the software industry. To create a simple Fibonacci sequence in C,...115 readsRust
Nouman Rahmanprogrammingfire.hashnode.dev·Oct 15, 2022picoCTF 2022: Binary Exploitation: buffer overflow 0Introduction Challenge: buffer overflow 0 Category: Binary Exploitation Description: Smash the stack. Let's start off simple, can you overflow the correct buffer? The program is available here. You can view the source here. And connect with it using:...10 likes·1.6K readspicoCTF 2022Binary Exploitation
Nouman Rahmanprogrammingfire.hashnode.dev·Oct 14, 2022picoCTF 2022: Binary Exploitation: basic-file-exploitIntroduction Challenge: basic-file-exploit Category: Binary Exploitation Description: The program provided allows you to write to a file and read what you wrote from it. Try playing around with it and see if you can break it! Connect to the program ...10 likes·1.0K readspicoCTF 2022picoCTF 2022
Davide Guerridguerri.hashnode.dev·Aug 20, 2022Binary Exploitation - PWN101 Write-upThis is the write-up for the PWN101 room on TryHackMe, created by Jopraveen. You can find the room (Difficulty: Medium) will all the challenges here. To develop the exploits in this document, I used Pwntools and Radare2. For the ROP (Return Oriented ...1.2K reads#cybersecurity