Protected: Steganography CTF
There is no excerpt because this is a protected post.
There is no excerpt because this is a protected post.
There is no excerpt because this is a protected post.
There is no excerpt because this is a protected post.
There is no excerpt because this is a protected post.
Fuzzing is an automated way to find vulnerabilities in software. Fuzzing has grown in popularity as personal computers have become more accessible and powerful. In this post I will briefly detail my first experience using WinAFL. The first step was to write some vulnerable code to fuzz. Here’s the function that has the two unique... » read more
Recently my friend Colin started the HackerOne CTF and encouraged me to participate as well. I know nothing about web hacking and most of the CTF is web based. I’ve installed Burp Suite and messed around with it a little bit. I have only found two of the web based flags so far and have... » read more
I started reversing about a year ago and I knew that Python was a valuable tool that I would need to pick up. The opportunity presented itself when I was asked to help with patching a PE file. I needed to make something that could be easily distributed publicly while also being very transparent about... » read more
Continuing from Stage4, now onto the final stage, Stage5! Right away Stage5 had me a bit baffled. Up until this point I had been relying entirely on comparisons, tests, and jumps to determine the steps necessary for completing the previous stages. Without any of these I was lost as to where I should begin. There... » read more
This a short demonstration of some software I’ve been developing that I call Packet Biter. This software is heavily influenced by Manfred’s “Proxy” software which he showed in this video with Vice’s Motherboard. Packet Biter is still in the very early stages of development. The front-end is garish and due for a complete overhaul, it... » read more
Continuing from Stage3, now onto Stage4. First there’s a call to RegOpenKeyExA which opens a specified register key. This call is returning with a value of 0x2 which is the error code for FILE_NOT_FOUND. The first parameter of RegOpenKeyExA is a handle to a key, or it can be a predefined key. This call is... » read more