Home

April 2, 2019

Finding cipher algorithm of an encrypted file

I was solving a CTF challenge when I came in contact with an encrypted file I downloaded from a FTP that I had just compromised. I decided to write a quick write up about how I managed to find the cipher algorithm used to encrypt the file in the goal of brute forcing it.
October 16, 2018

Local Linux privilege escalation overview

This article will give an overview of the basic Linux privilege escalation techniques. Different scopes will be explained like the kernel, the permission file...
October 15, 2018

Exploit a basic buffer overflow

Understanding buffer overflow code injection through a basic example
September 17, 2018

Setting up a remote Tor middle box

Setting up a TOR transparent proxy (middle box) in a remote OpenBSD server trough a VPN