Binary Exploitation
April 26, 2020
This blogpost contains the solutions for Narnia series of challenges from overthewire, this category of challenges are aimed at beginners to binary exploitation. Let's take a look at the code...
January 18, 2020
Welcome to part one of the x86 Linux binary exploitation series. In these series of posts, I will cover x86 Linux binary exploitation, from basics to advanced topics.
Windows-Exploit
February 10, 2020
Welcome to part one of the x86 Linux binary exploitation series. In these series of posts, I will cover x86 Linux binary exploitation, from basics to advanced topics.
Hackthebox
June 09, 2020
Chainsaw is a retired vulnerable VM from Hack. This box is about Solidity, Ethereum Blockchain and IPFS Exploitation
May 15, 2020
Carrier is a retired vulnerable VM from Hack. This box is really fun since it allows us to play with BGP Hijacking which is pretty rare to see in CTF...
May 03, 2020
OpenAdmin is rated as a Easy Linux box. It was released on 04 Jan 2020 and has been created by @dmw0ng This box required us to perform the following tasks:...
ROP
July 17, 2020
This is a recently retired binary exploitation (pwn) challenge from hackthebox.
May 15, 2020
This is the Second challenge from ROP Emporium, challenge name Split. In this challenge we have to create a small ROP Chain which execute system and give us the flag...
May 08, 2020
Doing these challenges to improve my binary exploitation skills and teach my self Return oriented programming (ROP). These challenges use the usual CTF objective of retrieving the contents of a...
ActiveDirectory
September 19, 2020
Demo of recent Windows Zerologin exploit
PowerShell
October 13, 2020
Powershell is an extremely powerful scripting and administration language that is baked right into Windows, this make an attractive target for attackers. Over the years PowerShell is increasingly being used...
Active Directory Red Team
March 26, 2021
In this module I will cover how you can enumerate Microsoft Active Directory with Powerview and gather critical information about the Active Directory and its components.
February 19, 2021
Enterprises are using Microsoft Active Directory for identity management and protecting resources. As a blue or red teamer finding and exploiting flaws and understanding the underlying security issue is very...
Security Advisories
March 12, 2021
Last week, Microsoft released out-of-band updates to address multiple zero-day vulnerabilities which affect the on-premises version of the exchange server
No posts found
Try a different search term or browse all categories