March
30th,
2019
I am at a point in my research/training where I am needing to start getting very comfortable with WinDbg, and since on my home machine I currently am running Ubuntu Linux as my daily driver this is how I got it all working ...
March
24th,
2019
This is going to be part one of an on going series I am calling the Retro Exploit Series ... and Episode One will be covering everyone's favorite vulnerable server ... VulnServer!
March
14th,
2019
I was officially certified in the SecurityTube Linux Assembly Expert x86_64 (SLAE64) on March 14, 2019...
March
12th,
2019
Assignment seven of of the SLAE64 has us creating an Linux/x86_64 custom crypter for our shellcode...
March
11th,
2019
Part three of assignment six of the SLAE64 has us performing our third and final polymorphic transformation on the Linux/x64 shellcode taken from shell-storm.org, Linux/x86_64 reboot(POWER_OFF)...
March
10th,
2019
Part two of assignment six of the SLAE64 has us performing our second polymorphic transformation on the Linux/x64 shellcode taken from shell-storm.org, execve("/bin/sh")...
March
9th,
2019
Part one of assignment six of the SLAE64 has us performing our first polymorphic transformation on the Linux/x64 shellcode taken from shell-storm.org, sethostname() & killall...
March
7th,
2019
Assignment five of the SLAE64 we were asked to perform a thorough analysis of three separate Linux/x64 shellcode payloads of our choosing using gdb, this is part three of three, linux/x64/exec ...
March
4th,
2019
Assignment five of the SLAE64 we were asked to perform a thorough analysis of three separate Linux/x64 shellcode payloads of our choosing using gdb, this is part two of three, linux/x64/shell_bind_tcp_random_port ...
March
3rd,
2019
Assignment five of the SLAE64 we were asked to perform a thorough analysis of three separate Linux/x64 shellcode payloads of our choosing using gdb, this is part one of three, linux/x64/shell_bind_tcp ...