How to Create a Secure Ansible Hosts File: SSH, Vault, and Environment Variables
Learn how to create a secure Ansible hosts file with best practices for managing sensitive information. This guide covers using SSH keys, Ansible Vault, and environment variables to protect credentials and improve automation security. Discover essential tips for secure Ansible configurations and avoid the risks of hardcoding passwords.
Huntress 2024 CTF: StackIT XOR Operation Challenge
This blog post dives deep into XOR operations, a key technique often used in CTF challenges for obfuscating data.
We’ll walk through real-world examples, including the Huntress 2024 CTF STACKIT challenge, demonstrating how to identify XOR operations in binary files, analyze them using GHIDRA, and automate the decryption process with Python.
Whether you’re a beginner or a seasoned penetration tester, this post will enhance your reverse engineering skills and provide practical insights for tackling real-world security challenges.
Misfortune CTF: x86-64 Binary Exploitation ft. Ret2libc, ROP, pwntools
The Misfortune CTF challenge is a goldmine for those diving into binary exploitation on x86-64 architectures. Tackling this challenge isn’t just about solving a problem—it’s a journey through critical exploitation techniques like Return-Oriented Programming (ROP), using the PLT and GOT to pivot to libc functions, and leveraging tools like Pwntools to automate and simplify these complex tasks.
Mastering the interplay between the Procedure Linkage Table (PLT) and the Global Offset Table (GOT) while executing a ret2libc attack gives a real-world look into bypassing protections in modern binaries. The experience also builds practical skills with Pwntools, strengthening your toolkit for future binary exploits. For anyone looking to hone their exploitation abilities, Misfortune provides both foundational knowledge and hands-on expertise, bringing immense value to any pentester's or security researcher’s skillset.
Starting with Large Language Models (LLMs) using Hugging Face and PyTorch
Start learning how to create your own AI text generator with LLMs (Large Language Models) using Hugging Face and PyTorch to simplify the requirements where data sets are concerned.
Huntress 2024 CTF Go Malware GoCrackMe1 Challenge using IDA
Huntress 2024 CTF Golang Reverse Engineering: using IDA (Interactive Debugger) reverse engineer a non-stripped Go binary and redirect the assembly instructions to complete unintended actions.
Penetration Testing and Generative AI
An opinion piece on the utility of generative AI for penetration testing, and more on the impact of AI on education, developers, and the morally ambiguous.
GDB for Reverse Engineering
Explore the Command Line Utility GDB: This guide is designed to help beginners understand the essential commands for analyzing ELF binaries.
x86-64 Basic Buffer Overflow Theory
This is a x64 Linux basic buffer overflow using the insecure strcpy() C function to demonstrate using GDB and GEF to exploit this vulnerability (binary exploitation).
TryHackMe | Reversing Elf Challenge
Explore the fundamentals of reverse engineering with the TryHackMe Reversing ELF room, designed specifically for beginners. This blog showcases the use of GHIDRA, RADARE2 (R2), and other powerful tools to help you dissect ELF files. Perfect for CTF enthusiasts, you'll learn essential techniques to analyze binaries and tackle real-world challenges
Wireless Penetration Testing: WPA2-PSK
An introduction to wireless penetration testing against WPA2-PSK networks using the aircrack-ng suite of tools.
Setting up Docker on your Raspberry Pi
A tutorial for setting up Docker on a Raspberry Pi 4 and becoming familiar with the docker command line utilities and setting up a simple web application.
Golang for Offensive Security
Explore why Golang is useful to offensive security personnel, and a priority item to be understood for cyber defenders.
Cobalt Strike for Red Team Operations
An introduction to Cobalt Strike, a commercially available command and control tool for red teamers and pentesters.
PowerShell Empire for Red Team Operations
An introduction to PowerShell Empire, an open-source command and control tool for red teamers and pentesters.