Ransomware crackme
I use IDA to reverse engineer an executable using multi-stage encryption (AES-256-ECB and RC4). Through static analysis in IDA, identified the encryption flow, extracted encrypted files from PCAP t...
I use IDA to reverse engineer an executable using multi-stage encryption (AES-256-ECB and RC4). Through static analysis in IDA, identified the encryption flow, extracted encrypted files from PCAP t...

TL;DR: A Yale law and philosophy professor’s journey back into cybersecurity delivers the exploration of why we keep failing at security over the years. Through five perfectly chosen historical att...

This will be a detailed writeup on my experience at my first Hacker summer camp. The Pre-Game Panic Soldering at 4 AM because apparently I hate sleep A day before hacker summer camp I was tha...

Short Summary This book follows Nicole Perlroth investigating the zero-day market, cyber weapons, and the cyber arms race. She was originally covering Silicon Valley stuff when suddenly the New Yo...

Book review of Limitless by Jim Kwik root@review:~$ SCORE:// 9 /10.0 ...

Book review of Breached! by Daniel J. Solove and Woodrow Hartzog root@review:~$ SCORE:// 8.5 /10.0 ...

This challenge involves an XXE vulnerability, which is part of the OWASP Top 10 under A05:2021 – Security Misconfiguration. You’re asked to upload an XML file, with a hint about XML entities. By c...

We reversed an APK that instantly wipes the flag on launch. By analyzing the layout XML in Android Studio, we pieced the flag back together from hidden TextViews. This challenge is from BYUCTF, wh...
Loading song...