Explore >> Select a destination


You are here

blog.nuculabs.dev
| | blog.nuculabs.de
1.9 parsecs away

Travel
| | Hello, Here are my write-ups for the X-MAS CTF 2019 organized by . Reversing: Santa's crackme Santa's crackme is easy to solve when using Ghidra, all you need to do is open up the binary, read the code and use the XOR Memory script from Ghidra. The flag is retrieved from flag_matrix and xored by 3. Select the flag data, right click on Script Manager and execute the XorMemory script We get the flag, except for the first character
| | mouha.be
2.2 parsecs away

Travel
| | [AI summary] The blog post introduces buffer overflow attacks on Linux x86-64 platforms, explaining how to generate and execute shellcode using tools like Docker and mprotect() to bypass stack protection mechanisms.
| | michaelneuper.com
1.5 parsecs away

Travel
| | A buffer overflow attack is a type of cyber attack in which an attacker attempts to write more data to a buffer (a temporary data storage area) in a computer's memory than the buffer is designed to hold. This can cause the buffer to overflow, or exceed its maximum capacity, which can corrupt other parts of the computer's memory and allow the attacker to gain unauthorized access to the system.
| | www.thexero.co.uk
17.8 parsecs away

Travel
| During web applcations penetration tests, it is very common to come across a number of different CMS systems. Nothing is worse and more time consuming that looking for any publicly discovered vulnerabilities without knowing anything about these solutions. In this post, I introduce the ConScan tools, a black-box vulnerability scanner for the Concrete5 CMS system.