April 2, 2019
I was solving a CTF challenge when I came in contact with an encrypted file I downloaded from a FTP that I had just compromised. I decided to write a quick write up about how I managed to find the cipher algorithm used to encrypt the file in the goal of brute forcing it.
October 16, 2018
This article will give an overview of the basic Linux privilege escalation techniques. Different scopes will be explained like the kernel, the permission file...
October 15, 2018
Understanding buffer overflow code injection through a basic example
September 17, 2018
Setting up a TOR transparent proxy (middle box) in a remote OpenBSD server trough a VPN