A writeup of Reverse Engineering Challenge of Arab Security Cyber WarGames. Points : 300 Just a file check with no description. Who gives a description of reverse challenges anyways? that bein...
Use VIM as HEX editor like a boss
VIM's already OP. Here's how to do more. VIM in itself is a pretty powerful text editor, and the fact we can integrate this with other programs and scripts makes it stronger. In this article, I...
Custom Signature PHP Payloads
Easily generating PHP Payloads with Custom file signatures to bypass input sanitization What is this? A tip on bypassing input sanitation by changing the payload signature. This process is gener...
DDoS attack Simulation in NS3
Distributed Denial of Service Attack Simuation Build from scratch in C++ This article is about coding a Distributed Denial of Service Attack simulation in NS-3 discrete event network simulator. ...
Shifter2 [CipherCombat2.0 CTF write-up]
Reverse Engineering Challenge of Hacker Earth CipherCombat2.0 What we get? A zip file with password “hakerearth”… In there we find a PNG image Checking the file for strings and embedded fi...
Locked [CipherCombat2.0 CTF write-up]
Reverse Engineering Challenge of Hacker Earth CipherCombat2.0 What we get ? We get a zip file with our binary in it with password hackerearth. After unzipping the file, we can start looking...
Recover Files in Linux from Live Processes
Recover recently deleted file (if it’s still open in some process) using properties of procfs Ever deleted an important file while it’s still open in some other process? or Someone opened a PDF ...
Winning Race Conditions
Introduction to Race Condition Vulnerability and how to Exploit them. One fine day, someone, somewhere was absorbing random knowledge from the “great internet forums” and stumbled on a CTF chall...
Digest [CipherCombat2.0 CTF write-up]
Reverse Engineering Challenge of Hacker Earth CipherCombat2.0 What we get? A zip file with password “hackerearth”… unzip it and we get a Linux Executable Notice I highlighted LSB(Least Sign...
Extracting injected malware from memory
Extraction of injected malicious PE from dynamic memory in windows (Remcos malware) Usually, malware comes packed by some packer which obfuscates the original code and helps it to evade AV softw...