Hey guys, welcome back on Exploitnetoworking! Today we will see the writeup of the binary exploitation challenge Jendy’s by UTCTF. This challenge is an hard pwn binary, that for exploit it, you must use two technics, the first step is manage the heap for obtain an arbitrary free and the second step is use a format string for obtain a write what where.
We may find ourselves on our domain server with old DNS records associated with IP addresses that however are dated or no longer reflect the current reality. We try to understand how to eliminate them automatically without going crazy.
Welcome back on Exploitnetworking! Today we’ll see the writeup of Hack The Box Sunday machine. This box was been really easy because with a simple nmap and with some enumerations you can enter in server, after that with some tricks you can get root user.
The backup, probably one of the most important things if you do not want to be screwed in IT. Only at the thought of losing important data within a company is the creepy. So we try to understand what backup is and its various types.