|
You are here |
blog.redcrowlab.com | ||
| | | | |
www.lab539.com
|
|
| | | | | This LimaCharlie lookup allows you to check whether binaries being executed on your Linux system are known malware and create rules or actions that trigger if so. This is a free lookup provided by Lab539 which pulls from various sources including our own sensor network. | |
| | | | |
michaelneuper.com
|
|
| | | | | A buffer overflow attack is a type of cyber attack in which an attacker attempts to write more data to a buffer (a temporary data storage area) in a computer's memory than the buffer is designed to hold. This can cause the buffer to overflow, or exceed its maximum capacity, which can corrupt other parts of the computer's memory and allow the attacker to gain unauthorized access to the system. | |
| | | | |
blog.nuculabs.dev
|
|
| | | | | Hello, In this article I present you the solution to nice and short cracking challenge from Root-Me. After opening it up in Ghidra, I saw that the challenge is easy to solve, all you need is to find the password, which is in plain text. Basically just copy paste and you get the flag, but wait, there's a twist! I should have learned my lesson from the other challenge from Root-Me, which also had a twist. | |
| | | | |
ericlathrop.com
|
|
| | | This weekend I gave a presentation on the Jekyll static site generator at MOSSCon. | ||