Low-Level Programming, Binary Exploitation, and Reverse EngineeringExploring low-level programming and reverse engineering is essential for anyone diving into the technical depths of software exploitation…Nov 25Nov 25
Unpacking Network Traffic: Analyzing PCAP File with Wireshark.The PCAP file I’m analyzing comes from a recent Capture the Flag (CTF) cybersecurity challenge I attended, held in a nearby town. This CTF…Nov 2Nov 2
Exploiting the CUPS Vulnerability and Gaining a Reverse Shell (9.9 CVSS)Let’s start by introducing our readers to what CUPS (Common Unix Printing System) is and what they need to know to follow along with this…Oct 11Oct 11
“Mastering” the Art of Programming in 2023: A Comprehensive Guide for Beginners.Hello, everyone! Welcome back to my blog, this is my third blog of the year and I can’t wait to share more with you. In this blog, I will…Jan 29, 20231Jan 29, 20231
Learn to Hack Web Apps for FreeHello, everyone. I hope everything is going well for you. I am back again with another article and this time I will be guiding you on how…Aug 29, 20221Aug 29, 20221