Nouman RahmanforProgrammingFireprogrammingfire.hashnode.net·Oct 14, 2022picoCTF 2022: Binary Exploitation: basic-file-exploitIntroduction Challenge: basic-file-exploit Category: Binary Exploitation Description: The program provided allows you to write to a file and read what you wrote from it. Try playing around with it and see if you can break it! Connect to the program ...Discuss·10 likes·494 readspicoCTF 2022picoCTF 2022
Nouman RahmanforProgrammingFireprogrammingfire.hashnode.net·Oct 15, 2022picoCTF 2022: Binary Exploitation: buffer overflow 0Introduction Challenge: buffer overflow 0 Category: Binary Exploitation Description: Smash the stack. Let's start off simple, can you overflow the correct buffer? The program is available here. You can view the source here. And connect with it using:...Discuss·10 likes·653 readspicoCTF 2022Binary Exploitation
WarrenMuforOpen Source Community Kampalaoscakampala-1654018717715.hashnode.net·Jan 8, 2023C vs Rust cyber security programming. Which one to choose.Both C and Rust are programming languages that can be challenging to learn, especially if you are new to programming. However, they are both powerful languages that are widely used in the software industry. To create a simple Fibonacci sequence in C,...Discuss·82 readsRust
HodlToM00NforHodlToM00Nhodltom00n.hashnode.net·Mar 2, 2023GryphonCTF 2022: ret2secret WriteupGCTF or Gryphon CTF is a Capture-The-Flag event hosted by Cybersecurity students from Singapore Poly. This write-up provides a solution to solve one of the binary exploitation, a.k.a PWN challenges, titled ret2secret. Approach The challenge features ...Discuss·62 readsCTF
WarrenMuforOpen Source Community Kampalaoscakampala-1654018717715.hashnode.net·Jan 8, 2023C vs Rust cyber security programming. Which one to choose.Both C and Rust are programming languages that can be challenging to learn, especially if you are new to programming. However, they are both powerful languages that are widely used in the software industry. To create a simple Fibonacci sequence in C,...Discuss·82 readsRust
Nouman RahmanforProgrammingFireprogrammingfire.hashnode.net·Oct 15, 2022picoCTF 2022: Binary Exploitation: buffer overflow 0Introduction Challenge: buffer overflow 0 Category: Binary Exploitation Description: Smash the stack. Let's start off simple, can you overflow the correct buffer? The program is available here. You can view the source here. And connect with it using:...Discuss·10 likes·653 readspicoCTF 2022Binary Exploitation
Nouman RahmanforProgrammingFireprogrammingfire.hashnode.net·Oct 14, 2022picoCTF 2022: Binary Exploitation: basic-file-exploitIntroduction Challenge: basic-file-exploit Category: Binary Exploitation Description: The program provided allows you to write to a file and read what you wrote from it. Try playing around with it and see if you can break it! Connect to the program ...Discuss·10 likes·494 readspicoCTF 2022picoCTF 2022
Davide GuerriforRandom tech stuffdguerri.hashnode.net·Aug 20, 2022Binary Exploitation - PWN101 Write-upThis is the write-up for the PWN101 room on TryHackMe, created by Jopraveen. You can find the room (Difficulty: Medium) will all the challenges here. To develop the exploits in this document, I used Pwntools and Radare2. For the ROP (Return Oriented ...Discuss·412 reads#cybersecurity