Low-Level Programming, Binary Exploitation, and Reverse EngineeringExploring low-level programming and reverse engineering is essential for anyone diving into the technical depths of software exploitation…Nov 25, 2024Nov 25, 2024
Unpacking Network Traffic: Analyzing PCAP File with Wireshark.The PCAP file I’m analyzing comes from a recent Capture the Flag (CTF) cybersecurity challenge I attended, held in a nearby town. This CTF…Nov 2, 2024Nov 2, 2024
Exploiting the CUPS Vulnerability and Gaining a Reverse Shell (9.9 CVSS)Let’s start by introducing our readers to what CUPS (Common Unix Printing System) is and what they need to know to follow along with this…Oct 1, 20241Oct 1, 20241
“Mastering” the Art of Programming in 2023: A Comprehensive Guide for Beginners.Hello, everyone! Welcome back to my blog, this is my third blog of the year and I can’t wait to share more with you. In this blog, I will…Jan 29, 20231Jan 29, 20231
Learn to Hack Web Apps for FreeHello, everyone. I hope everything is going well for you. I am back again with another article and this time I will be guiding you on how…Aug 29, 20221Aug 29, 20221