Le journal d'un reverser
vendredi 29 mai 2020
When ransomware does SEO
›
Last night I was called by a friend. Usual story, someone he knows has been cryptolocked, that's tragic, usual tears and screams, yadda ...
mercredi 20 février 2019
Executing payload without touching the filesystem (memfd_create syscall)
›
Sometime, you gain code execution on a target and you want to leverage it to a full metasploit payload (or any other relevant binary). If yo...
mercredi 20 juin 2018
Credential stealing with XSS without user interaction
›
0/ Intro XSS are everywhere, on a lot of websites. It has been called the most underrated security vulnerability. On one hand, you can p...
mardi 20 février 2018
Fun with function names. Where resolving goes wild.
›
Last night, I was looking through C-code and ARM assembly. I was wondering myself: When a binary calls a function inside a shared lib, how ...
mardi 30 janvier 2018
Solving a CTF chall the [academic|hardest] way (FIC2018)
›
My previous articles on solving a crackme has gained some attention, so I'm doing the next one (and the last, I promise). This time, I...
dimanche 28 janvier 2018
Solving a CTF chall the [crazy|OMG] way (FIC2018)
›
This is the third blogpost about the same crackme, you can read the first two ones here: http://0x90909090.blogspot.fr/2018/01/solving-ctf...
Solving a CTF chall the [hard|good] way (FIC2018)
›
Hope you liked my last blogpost http://0x90909090.blogspot.fr/2018/01/solving-ctf-chall-easylazy-way-fic2018.html , this is the same binary...
›
Accueil
Afficher la version Web