Corey Gardnercoreyscorner.hashnode.dev·Mar 25, 2024Intro to x86 Hacking: Function ProloguesHacking is like doing a magic trick, it impresses the uninitiated precisely because they don't understand what they are seeing. The hacker is a systems thinker, an exceptional one who knows the rules of the system so well that it seems like they are ...Discussassembly x86/64 assembly programming
Damon Vesseydamonvessey.com·Feb 18, 2024What are registers?You can think of registers as variables the CPU uses for faster data access than accessing data from memory. There are only a few registers the CPU has, so where do we store the rest of our variables in our programs? The stack and the heap. We can se...DiscussFrom Beginner to Smashing the Stack for Fun and Profit and Beyondgdb
VJ XI0xeleven.me·Sep 19, 2023Ultimate x86 Assembly for Hackerman [PART 1]Introduction Welcome to a series of articles that will take you on a captivating journey into the heart of x86 assembly, demystifying its secrets, and equipping you with the essential knowledge needed to excel in the field of cybersecurity. Disclaime...Discuss·47 readsAssembly
ghouti_yelles0xor1day.hashnode.dev·Sep 5, 2023Mastering Binary Exploitation: A Dive into CybersecurityIn the ever-evolving landscape of cybersecurity, mastering binary exploitation is a critical skill. It's the art of identifying and exploiting vulnerabilities in compiled software programs, a skill often used by both ethical hackers and malicious act...Discuss·1 likeLinux
Talsonripp3rdoc.hashnode.dev·Aug 25, 2023SigReturn-Oriented Programming (SROP) Technique — Binary ExploitationReturn-Oriented Programming (ROP) stands as a prominent technique employed in the realm of exploitation, effectively circumventing security mechanisms such as NX/DEP. By delving into the intricacies of the ROP technique, an array of innovative "retur...Discuss·7 likes·506 readsreturn oriented programming
VJ XI0xeleven.me·Aug 20, 2023The Significance of Assembly Language in Computer Security StudiesIn the intricate world of computer security, where threats lurk behind every line of code, a deep understanding of assembly language stands as a pillar of knowledge. Assembly language, often regarded as the bridge between high-level programming langu...DiscussComputer Science
Nick GNONLONFOUNkingnl.hashnode.dev·Jul 6, 2023From zero to hero: Pwn - 1Salut chers passionnés de cybersécurité ! Comme promis dans mon précédent article, nous allons démarrer la série d'articles sur le pwn. Alors ... Qu'est-ce-que le pwn ? Le pwn est un terme employé en hacking pour désigner l'action de dominer, de conq...Discuss·1 like·92 readspwn
HodlToM00Nhodltom00n.hashnode.dev·Mar 2, 2023GryphonCTF 2022: ret2secret WriteupGCTF or Gryphon CTF is a Capture-The-Flag event hosted by Cybersecurity students from Singapore Poly. This write-up provides a solution to solve one of the binary exploitation, a.k.a PWN challenges, titled ret2secret. Approach The challenge features ...Discuss·111 readsCTF
WarrenMuforOpen Source Community Kampalablog.oscakampala.org·Jan 8, 2023C vs Rust cyber security programming. Which one to choose.Both C and Rust are programming languages that can be challenging to learn, especially if you are new to programming. However, they are both powerful languages that are widely used in the software industry. To create a simple Fibonacci sequence in C,...Discuss·156 readsRust
Nouman Rahmanprogrammingfire.hashnode.dev·Oct 15, 2022picoCTF 2022: Binary Exploitation: buffer overflow 0Introduction Challenge: buffer overflow 0 Category: Binary Exploitation Description: Smash the stack. Let's start off simple, can you overflow the correct buffer? The program is available here. You can view the source here. And connect with it using:...Discuss·10 likes·2.0K readspicoCTF 2022Binary Exploitation