We may find ourselves on our domain server with old DNS records associated with IP addresses that however are dated or no longer reflect the current reality. We try to understand how to eliminate them automatically without going crazy.
Welcome back on Exploitnetworking! Today we’ll see the writeup of Hack The Box Sunday machine. This box was been really easy because with a simple nmap and with some enumerations you can enter in server, after that with some tricks you can get root user.
The backup, probably one of the most important things if you do not want to be screwed in IT. Only at the thought of losing important data within a company is the creepy. So we try to understand what backup is and its various types.
Welcome back on Exploitnetworking! PingPong was a pwn challenge of SECT CTF 2018, based on buffer overflow. The main goal was use an overflow to leak the memory addresses of remote libc (for bypass aslr) and then create a ropchain for spawn a shell.
Each operating system has its default file system, each with its merits and defects; APFS for Mac OSX, Ext4 for Linux and NTFS for Windows. We analyze the NTFS to understand how it behaves with the permissions associated with files and folders.
Hey guys! Here there is another writeup of a pwn of the HackCon18 ctf. The challenge She Sells Sea Shells was a very easy pwn based on buffer overflow, where you can simply put a shellcode in buffer and jump on it!
Hey guys, it’s just finished the HackCon18 ctf, let’s see the writeup of Simple Yet Elegent pwn. This pwn is based on format string vulnerability and buffer overflow, then our target is leak an address of libc with the format string (because we suppose that ASLR is enabled), and then calculate remote system for spawn a shell.
Recently I have tried for the first time an Arm pwn, a simple program vulnerable to buffer overflow. The only difference between an Arm pwn and a “normal” binary is the assembly code, but look this for see how exploit it.