You are here |
goggleheadedhacker.com | ||
| | | |
www.jaybosamiya.com
|
|
| | | | To either solve an RE challenge, or to be able to pwn it, one must first analyze the given binary, in order to be able to effectively exploit it. Since the binary might possibly be stripped etc (found using file) one must know where to begin analysis, to get a foothold to build up from. | |
| | | |
www.sjoerdlangkemper.nl
|
|
| | | | When a website is hacked, the attacker often leaves a backdoor or webshell to be able to easily access the website in the future. These are often obfuscated to avoid detection, and need authentication so only the attacker can gain access to the site. In this post I am going to deobfuscate a webshell and show how the authentication can be bypassed when you have the source code but not the password. | |
| | | |
www.trickster.dev
|
|
| | | | Code level discussion of web scraping, gray hat automation, growth hacking and bounty hunting | |
| | | |
mycrap.w3bguy.com
|
|
| |