|
You are here |
michaelneuper.com | ||
| | | | |
blog.nuculabs.dev
|
|
| | | | | Hello, In this article I present you the solution to nice and short cracking challenge from Root-Me. After opening it up in Ghidra, I saw that the challenge is easy to solve, all you need is to find the password, which is in plain text. Basically just copy paste and you get the flag, but wait, there's a twist! I should have learned my lesson from the other challenge from Root-Me, which also had a twist. | |
| | | | |
malwaretech.com
|
|
| | | | | Discussion thread: https://updatedsecurity.com/topic/9-openssl-vulnerability-cve-2022-3602-cve-2022-3786/ | |
| | | | |
mouha.be
|
|
| | | | | [AI summary] The blog post introduces buffer overflow attacks on Linux x86-64 platforms, explaining how to generate and execute shellcode using tools like Docker and mprotect() to bypass stack protection mechanisms. | |
| | | | |
3.70.187.24
|
|
| | | [AI summary] The article compares Python and C by implementing simple socket communication examples in both languages, highlighting their strengths and use cases. | ||