Explore >> Select a destination


You are here

goggleheadedhacker.com
| | www.jaybosamiya.com
14.2 parsecs away

Travel
| | To either solve an RE challenge, or to be able to pwn it, one must first analyze the given binary, in order to be able to effectively exploit it. Since the binary might possibly be stripped etc (found using file) one must know where to begin analysis, to get a foothold to build up from.
| | www.sjoerdlangkemper.nl
14.0 parsecs away

Travel
| | When a website is hacked, the attacker often leaves a backdoor or webshell to be able to easily access the website in the future. These are often obfuscated to avoid detection, and need authentication so only the attacker can gain access to the site. In this post I am going to deobfuscate a webshell and show how the authentication can be bypassed when you have the source code but not the password.
| | www.trickster.dev
14.6 parsecs away

Travel
| | Code level discussion of web scraping, gray hat automation, growth hacking and bounty hunting
| | mycrap.w3bguy.com
125.4 parsecs away

Travel
|