|
You are here |
blog.nuculabs.dev | ||
| | | | |
mouha.be
|
|
| | | | | [AI summary] The blog post introduces buffer overflow attacks on Linux x86-64 platforms, explaining how to generate and execute shellcode using tools like Docker and mprotect() to bypass stack protection mechanisms. | |
| | | | |
blog.nuculabs.de
|
|
| | | | | Hello, Here are my write-ups for the X-MAS CTF 2019 organized by . Reversing: Santa's crackme Santa's crackme is easy to solve when using Ghidra, all you need to do is open up the binary, read the code and use the XOR Memory script from Ghidra. The flag is retrieved from flag_matrix and xored by 3. Select the flag data, right click on Script Manager and execute the XorMemory script We get the flag, except for the first character | |
| | | | |
satharus.me
|
|
| | | | | I wrote this post back in late May 2019 but hadn't published it and I don't really remember why I didn't. It was supposed to be a follow up for the post on t... | |
| | | | |
blog.nelhage.com
|
|
| | | tl;dr "Transparent Hugepages" is a Linux kernel feature intended to improve performance by making more efficient use of your processor's memory-mapping hardware. It is enabled ("enabled=always") by default in most Linux distributions. Transparent Hugepages gives some applications a small performance improvement (~ 10% at best, 0-3% more typically), but can cause significant performance problems, or even apparent memory leaks at worst. To avoid these problems, you should set enabled=madvise on your server... | ||