Explore >> Select a destination


You are here

pwning.net
| | karmanyaah.malhotra.cc
2.5 parsecs away

Travel
| | [AI summary] The user provided a detailed write-up of their experience solving various pwn challenges in the bcactf 2022 competition. They described the techniques used for each challenge, including format string exploits, ROP chains, and libc leak methods. The write-up also mentions the final score and the team's placement in the high school division.
| | www.alfonsobeato.net
3.8 parsecs away

Travel
| |
| | pwning.systems
3.1 parsecs away

Travel
| | I'm writing this post because I often hear that kernel exploitation is intimidating or difficult to learn. As a result, I've decided to start a series of basic bugs and exercises to get you started! Prerequisites Knowledge of the Linux command line Knowing how to read and write basic C may be beneficial Being able to debug with the help of a virtual computer or another system Able to install the kernel module compilation build requirements A basic understanding of the difference between userland and kern...
| | www.darktrace.com
23.3 parsecs away

Travel
| Discover how Darktrace uses AI to detect cyber threats before CVEs are disclosed. See 10 real-world examples of early zero-day detection against ransomware, nation-state actors, and more.