Linux Buffer Overflows x86 Part -2 ( Overwriting and manipulating the RETURN address)

Hello Friends, this is the 2nd part of the Linux x86 Buffer Overflows. First of all I want to apologize for such a long delay after the First blog of … Continue reading “Linux Buffer Overflows x86 Part -2 ( Overwriting and manipulating the RETURN address)”

Ground Zero: Part 3-2 – Reverse Engineering – Patching Binaries with Radare2 – ARM64

In this post, we will explore a wonderful and powerful reverse engineering tool – Radare2, and see how we can patch binaries that we crack. In a previous post by … Continue reading “Ground Zero: Part 3-2 – Reverse Engineering – Patching Binaries with Radare2 – ARM64”

Ground Zero: Part 1-2 – Reverse Engineering Password Protected Reverse Shells – Linux x64

Prologue Its been a long time since I posted any of my blogs. What can I say, I was a bit busy with some of the office projects. But finally … Continue reading “Ground Zero: Part 1-2 – Reverse Engineering Password Protected Reverse Shells – Linux x64”

Assembly Language Programming and Shellcoding – Lab setup and some important things

Hi everyone, Considering delay in the previous post, I’m writing this post on fast-track. Very unusual for me 😛 Anyways, today we will be looking into lab setup first and … Continue reading “Assembly Language Programming and Shellcoding – Lab setup and some important things”

Getting started with Assembly language programming – End of theory (Not really :P)

Hi Everyone, Sorry for not posting for such long time. Some personal things + official business + Procrastination (as usual) cause the delay. But now I’m back from hiatus. This … Continue reading “Getting started with Assembly language programming – End of theory (Not really :P)”

Active Directory Penetration Dojo – Setup of AD Penetration Lab : Part 1

The Prologue Hello everyone, Welcome to the series of Active Directory Penetration Dojo. This series is for people who’ve used Windows but haven’t worked on Active Directory. This blog will … Continue reading “Active Directory Penetration Dojo – Setup of AD Penetration Lab : Part 1”

Ground Zero: Part 2-3 – Reverse Engineering – Building Cracked Binaries – Windows x64

Prologue In the previous post, we saw how to extract cleartext and encrypted passwords by reverse engineering the binaries which stored the passwords in memory or within the binary itself. … Continue reading “Ground Zero: Part 2-3 – Reverse Engineering – Building Cracked Binaries – Windows x64”