Categories
- Hardware (4)
- Linux (3)
- Misc (2)
- Programming (10)
- Reverse Engineering (2)
- Security (6)
Recent Posts
-
SLAE: “Polymorphic” – Assignment 6
Posted on 2018/01/04 | No CommentsThis blog post has been created for completing the requirements of the SecurityTube Linux Assembly Expert certification: http://securitytube-training.com/online-courses/securitytube-linux-assembly-expert/ Student ID: SLAE-1046 Assignment: Take 3 shellcodes from shell-storm and create “polymorphic” […]
Read More -
SLAE: Msfpayload (msfvenom) Shellcode Analysis – Assignment 5
Posted on 2018/01/03 | No CommentsThis blog post has been created for completing the requirements of the SecurityTube Linux Assembly Expert certification: http://securitytube-training.com/online-courses/securitytube-linux-assembly-expert/ Student ID: SLAE-1046 Assignment: Create three Linux x86 shellcode samples with msfpayload […]
Read More -
SLAE: Custom Encoder – Assignment 4
Posted on 2018/01/02 | No CommentsThis blog post has been created for completing the requirements of the SecurityTube Linux Assembly Expert certification: http://securitytube-training.com/online-courses/securitytube-linux-assembly-expert/ Student ID: SLAE-1046 Assignment: Create a custom encoding scheme like the “insertion […]
Read More -
SLAE: Egg Hunter – Assignment 3
Posted on 2017/12/19 | No CommentsThis blog post has been created for completing the requirements of the SecurityTube Linux Assembly Expert certification: http://securitytube-training.com/online-courses/securitytube-linux-assembly-expert/ Student ID: SLAE-1046 Assignment: Study the Egg Hunter shellcode. Create a working […]
Read More -
SLAE: Reverse TCP Shell – Assignment 2
Posted on 2017/12/15 | 3 CommentsThis blog post has been created for completing the requirements of the SecurityTube Linux Assembly Expert certification: http://securitytube-training.com/online-courses/securitytube-linux-assembly-expert/ Student ID: SLAE-1046 Assignment: Create a shell_reverse_tcp shellcode that connects to an […]
Read More
-
Tags
aide archassault buffer overflow cp2102 crackme Crawler ctf DDNS defense Digispark DIY enumeration Evil-AP IP resolution Joffrey KVM lan tap linux loopback metasploit MQTT nasm nodogsplash OpenWrt patch pe-file port-forwarding Python reconnaissance rj-45 security serial shellcode SLAE social engineering soldering SSH synergy Tools uart unicode
Security Archive
-
Building an Evil-AP with TL-MR3020 – Part 3 – The Landing Page
Posted on 2015/06/29 | 1 CommentThis is part 3 of the “Building an Evil-AP with TL-MR3020″ series. If you haven’t read part 1 and 2 you can find them here. Now, we got the user […] -
Building an Evil-AP with TL-MR3020 – Part 2 – Captive Portal
Posted on 2015/04/27 | 5 CommentsThis is part 2 of the “Building an Evil-AP with TL-MR3020” series. If you haven’t read part 1 you can find it here. Here’s the necessary network information that we setup […] -
Building an Evil-AP with TL-MR3020 – Part 1 – Setup
Posted on 2015/04/24 | 3 CommentsSo, recently I got my hands on a cheap TP-Link TL-MR3020 and figured I could create an Evil-AP as a project. Flashing OpenWRT It ships with a firmware which makes […] -
Linux Security Tips – AIDE
Posted on 2015/02/09 | No CommentsAIDE – Advanced Intrusion Detection Environment What is AIDE? AIDE creates a database from regular expression rules established within its configuration files. Once AIDE has been kicked off, it will […] -
Simple Buffer Overflow
Posted on 2014/09/08 | 2 CommentsIn my pursuit of gaining a good understanding of how buffer overflows occur I decided to write a good and easy introductional tutorial on the subject. If you enjoy […]