Root-Me: ExploitMe – Basic Buffer Overflow
Hello, In this article I present you the solution to nice and short cracking challenge from Root-Me. After opening it up in Ghidra, I saw that the challenge...
Hello, In this article I present you the solution to nice and short cracking challenge from Root-Me. After opening it up in Ghidra, I saw that the challenge...
Hello! I’ve been playing recently a bit with Ghidra, which is a reverse engineering tool that was recently open sourced by the NSA. The official website des...
Right after I’ve configured the FTP server, I wanted to be able to “name” my server and so I’ve installed a lightweight DNS server. (context: previous articl...
After spending a good part of my weekend fiddling with VSFTPD, I’m very happy that I managed to get it to work properly. My goal was to create a simple, ano...
Hello everyone! After following the /r/homelab reddit for a while I’ve decided to give it a try and make myself my own homelab environment. I don’t have acc...
It’s been a while since I wrote a post and I’m also going to make this one a short one. Python Fire is a pretty cool Python library from Google that lets yo...
I’ve been reading the MIASM.re blog recently and I wanted to give miasm a try. The scope of this article is to provide guidance on how to build miasm on macO...
Keygenme or Not is a cute reversing challenge I found on root-me.org. It requires an username and an activation key. I particularly enjoyed this challenge an...
Hello and welcome to Nucu Labs agent! We’ve been contracted by some external contractors to help them break…, I mean, assist them in making their life easie...