cakehalohyperpwn.hashnode.dev·Oct 20, 2024Introduction to HyperPwn BlogHello there! This is the first article in my new IT-themed blog called “HyperPwn.” Now you might ask: “Why would you make a blog in 2024 when no one reads articles anymore?” That’s a totally valid question. For me, it’s not all about the number of re...1 like·27 readsHyperpwn
Wizard079forCOPS IIT BHUblogs.copsiitbhu.co.in·Oct 1, 2024Understanding Buffer Overflows: A Beginner's Guide - Part 2This article is a 2nd part of https://blogs.copsiitbhu.co.in/understanding-buffer-overflows-a-beginners-guide-part-1 make sure you have read that for understanding it In this article, we will dive into the binary and see what’s going on; for that, we...11 likes·84 readsProgramming Blogs
Reza Rashidiblog.redteamguides.com·May 30, 2024Assembly for Hackers"Assembly Unleashed: A Hacker's Handbook" is a definitive resource tailored specifically for hackers and security researchers seeking to master the art of assembly programming language. Authored by seasoned practitioners in the field, this book offer...10 likes·10.8K readsAssembly
Manh Dao Xuanvstxckr.hashnode.dev·May 25, 2024RegularityCate: Pwn Description Challenge cho chúng ta duy nhất file regularity. Sử dụng lệnh checksec, ta thấy file không có chế độ bảo vệ gì cả. Sử dụng IDA64 dịch ngược file, nhận thấy có một lỗ hổng tràn bộ đệm to đùng ở hàm read(). Exploit from pwn imp...pwn
Ngô Thành VănforBlueCyber's blogbluecyber.hashnode.dev·Mar 20, 2024CVE-2022-32548 Admin password changing POCI. About This article provides exploitation of password changing on Draytek router and steps that i took during the process of learning about this bug through other documents. The model using in this exploit is Vigor2912Fn and firmware version v3.8.1...1 like·813 readspwn
Patrick Peng0reg.dev·Feb 14, 2024Analysis: Tcache under glibc 2.27 && Bypass double freeTcache Struct To begin with,InGlibc 2.29, Tcache bin controlled by tcache_entry and tcache_perthread_struct: tcache_entry Glibc2.29Added Key,Which can help us finds out about Double Free typedef struct tcache_entry { struct tcache_entry *next; ...glibc
Nick GNONLONFOUNkingnl.hashnode.dev·Jul 6, 2023From zero to hero: Pwn - 1Salut chers passionnés de cybersécurité ! Comme promis dans mon précédent article, nous allons démarrer la série d'articles sur le pwn. Alors ... Qu'est-ce-que le pwn ? Le pwn est un terme employé en hacking pour désigner l'action de dominer, de conq...1 like·68 readspwn
HodlToM00Nhodltom00n.hashnode.dev·Mar 2, 2023GryphonCTF 2022: ret2secret WriteupGCTF or Gryphon CTF is a Capture-The-Flag event hosted by Cybersecurity students from Singapore Poly. This write-up provides a solution to solve one of the binary exploitation, a.k.a PWN challenges, titled ret2secret. Approach The challenge features ...71 readsCTF
Terence Chan Zun Munhackin7.hashnode.dev·Jun 5, 2022SEEing some Flags in SEETFOver the weekend, I participated in the SEETF Capture The Flag Competition. My Team was NYCP, and we ended up doing average (I hope) at 114th place out of 740 teams (560 teams got >200 points) Overall this was an interesting CTF. Some of the chall...201 reads#cybersecurity
Kaustubh Rairaikaustubh.com·Jun 20, 2020CTF: How it Works 🚩College students or most people, in general, are drawn to hacking as they want to feel the rush of excitement that comes from hacking something. But their general idea of what hacking is often coming from seeing it done in a movie, television, or a v...PostsCTF