VJ XI0xeleven.me·Sep 19, 2023Ultimate x86 Assembly for Hackerman [PART 1]Introduction Welcome to a series of articles that will take you on a captivating journey into the heart of x86 assembly, demystifying its secrets, and equipping you with the essential knowledge needed to excel in the field of cybersecurity. Disclaime...Discuss·36 readsAssembly
ghouti_yelles0xor1day.hashnode.dev·Sep 5, 2023Mastering Binary Exploitation: A Dive into CybersecurityIn the ever-evolving landscape of cybersecurity, mastering binary exploitation is a critical skill. It's the art of identifying and exploiting vulnerabilities in compiled software programs, a skill often used by both ethical hackers and malicious act...Discuss·1 likeLinux
Talsonripp3rdoc.hashnode.dev·Aug 25, 2023SigReturn-Oriented Programming (SROP) Technique — Binary ExploitationReturn-Oriented Programming (ROP) stands as a prominent technique employed in the realm of exploitation, effectively circumventing security mechanisms such as NX/DEP. By delving into the intricacies of the ROP technique, an array of innovative "retur...Discuss·7 likes·296 readsreturn oriented programming
VJ XI0xeleven.me·Aug 20, 2023The Significance of Assembly Language in Computer Security StudiesIn the intricate world of computer security, where threats lurk behind every line of code, a deep understanding of assembly language stands as a pillar of knowledge. Assembly language, often regarded as the bridge between high-level programming langu...DiscussComputer Science
Nick GNONLONFOUNkingnl.hashnode.dev·Jul 6, 2023From zero to hero: Pwn - 1Salut chers passionnés de cybersécurité ! Comme promis dans mon précédent article, nous allons démarrer la série d'articles sur le pwn. Alors ... Qu'est-ce-que le pwn ? Le pwn est un terme employé en hacking pour désigner l'action de dominer, de conq...Discuss·1 like·72 readspwn
HodlToM00Nhodltom00n.hashnode.dev·Mar 2, 2023GryphonCTF 2022: ret2secret WriteupGCTF or Gryphon CTF is a Capture-The-Flag event hosted by Cybersecurity students from Singapore Poly. This write-up provides a solution to solve one of the binary exploitation, a.k.a PWN challenges, titled ret2secret. Approach The challenge features ...Discuss·97 readsCTF
WarrenMuforOpen Source Community Kampalablog.oscakampala.org·Jan 8, 2023C vs Rust cyber security programming. Which one to choose.Both C and Rust are programming languages that can be challenging to learn, especially if you are new to programming. However, they are both powerful languages that are widely used in the software industry. To create a simple Fibonacci sequence in C,...Discuss·123 readsRust
Nouman Rahmanprogrammingfire.com·Oct 15, 2022picoCTF 2022: Binary Exploitation: buffer overflow 0Introduction Challenge: buffer overflow 0 Category: Binary Exploitation Description: Smash the stack. Let's start off simple, can you overflow the correct buffer? The program is available here. You can view the source here. And connect with it using:...Discuss·10 likes·1.2K readspicoCTF 2022Binary Exploitation
Nouman Rahmanprogrammingfire.com·Oct 14, 2022picoCTF 2022: Binary Exploitation: basic-file-exploitIntroduction Challenge: basic-file-exploit Category: Binary Exploitation Description: The program provided allows you to write to a file and read what you wrote from it. Try playing around with it and see if you can break it! Connect to the program ...Discuss·10 likes·687 readspicoCTF 2022picoCTF 2022
Davide Guerridguerri.hashnode.dev·Aug 20, 2022Binary Exploitation - PWN101 Write-upThis is the write-up for the PWN101 room on TryHackMe, created by Jopraveen. You can find the room (Difficulty: Medium) will all the challenges here. To develop the exploits in this document, I used Pwntools and Radare2. For the ROP (Return Oriented ...Discuss·1.2K reads#cybersecurity