Hey guys! Here there is another writeup of a pwn of the HackCon18 ctf. The challenge She Sells Sea Shells was a very easy pwn based on buffer overflow, where you can simply put a shellcode in buffer and jump on it!
Hey guys, it’s just finished the HackCon18 ctf, let’s see the writeup of Simple Yet Elegent pwn. This pwn is based on format string vulnerability and buffer overflow, then our target is leak an address of libc with the format string (because we suppose that ASLR is enabled), and then calculate remote system for spawn a shell.
Recently I have tried for the first time an Arm pwn, a simple program vulnerable to buffer overflow. The only difference between an Arm pwn and a “normal” binary is the assembly code, but look this for see how exploit it.
Mouse Without Border, the best free KVM to share keyboard, mouse and screens. Many features: can also be used through different sub-networks, encrypting data with a secret key, up to 4 pcs with a single keyboard / mouse and many other settings to make your life easier.
Welcome back on Exploitnetworking! Today we’ll see a Valentine write up. This box is really funny because the first step is based on heartbleed vulnerability that permit you to exploit openssl protocol and read the machine memory.
Everyone has a problem with Windows and look for an online guide that shows us how to change the system logs in the hope of solving it without understanding what you are actually doing. Good but not very well. We try to fully understand what we are going to change and how these registries are composed.
The hassle of having a screen that appears when trying to install a program can try to speed things up by lowering the level of security offered by Microsoft. Let's find out why this thing must'n never be done.
Hey guys! Today we are on Hack The Box for see Nibbles writeup. This machine, was been relatively easy compared to other machine. The web part was easy enough and the privilege escalation: “a piece of cake”