📝

Articles

Thoughts, tutorials, and technical writings

Latest Articles

NASM Crack


categories: - Reverse Engineering tags: - Reverse Engineering - Linux - crackmes.one


This is a solution submitted to the crackmes.one challenge by

Guess the password


categories: - Reverse Engineering tags: - Reverse Engineering - Linux - crackmes.one


This is a solution submitted to the crackmes.one challenge by

Brutus HackTheBox


categories: - DFIR tags: - HackTheBox - LogAnalysis


Scenario

In this very easy Sherlock, you will familiarize yourself with Unix auth.log …

Reveal Cyberdefenders


categories: - DFIR - Memory Forensics tags: - Volatility - CTI - Stealer


Scenario

As a cybersecurity analyst for a leading …

Noxious HackTheBox


categories: - CTF Writeup - Pentesting tags: - nmap - vulnerabilities


Sherlock Scenario

The IDS device alerted us to a …

Carnage TryHackMe


categories: - DFIR - Network Forensics tags: - TryHackMe - wireshark


Scenario

Eric Fischer from the Purchasing Department at Bartell Ltd …

Reverse-ELF-TryHackme


categories: - CTF Writeup - Reversing tags: - TryHackMe


Crackme1

Let's start with a basic warmup, can you run the …

Bit-O-Asm 1


categories: - CTF Writeup - Reversing tags: - Assembly


This site is a great reference point for x86_64 CPU architecture registers.

Web Strike Analysis


categories: [DFIR, Network Forensics] tags: [wireshark, web attacks] comments: true


Web Strike Analysis

Scenario

An anomaly was discovered within our …

Stego PicoCTF


categories: - CTF Writeup - Steganography tags: - picoCTF


Description Download this image and find the flag. Image

Hints We …

File Exploit PicoCTF


categories: [CTF Writeup, Binary Exploitation] tags: [picoCTF]


Challenge Description The program provided allows you to write to a file and read …