Root Me: Cracking: PE – 0 protection
Since this challenge has 0 protection we can easily solve it by searching for the string in the strings window of IDA. Select from the menu: View -> Open...
Since this challenge has 0 protection we can easily solve it by searching for the string in the strings window of IDA. Select from the menu: View -> Open...
I’ve just found out about this amazing website which offers a wide variety of challenges. Here’s my solution for the first challenge, this one is extremely ...
PicoCTF is an amazing capture the flag competition targeting middle and high school students. It’s a game that consists in solving various computer security ...
Real Time Operating Systems Real time operating systems are designed for real time applications that need to accomplish a certain tasks with as little OS ov...
As I’ve been reading Professional Assembly Language, I’ve come across chapter 13 and I liked it so much that I’m going to write a blog post about it. The boo...
Hello, this is a write-up regarding the HackTheBox reversing challenge: Impossible Password. Please don’t look at the solution if you haven’t attempted the ...
Hello! If you want to do Hackgnar’s BLE CTF but you’ve been struggling with flashing the ESP worry not! I have created a vagrant developer environment just ...
MalwareTech’s string challenges are so easy that everyone can do them. I’m writing this article in order to help those who struggle with them, but of course ...
I wanted to explore the magic of RFID and I bought a simple card reader from Banggood which allows me to read and write 13.56MHz cards. The reader comes with...
I decided that I want to do something new and I started to get into assembly and reverse engineering, hopefully I can build a career with this. I watched so...