Home

Rootwe realist writeup

This post entails about the walkthrough of cracking the machine on rootme.org in the realist seciton called root-we and is a web based challenge

Read more

Secret and Lies, Book Review

This was one of the first books I read when I started out to learn more about information security few months back, and hands down it played a great role in piquing my interest in information security. I had read Bruce's earlier work , and read his blogs which is updated regularly on issues around information security.

Read more

ARP Spoofing and MITM

ARP or Address resolution protocol is a protocol that maps layer 2 addresses or physical addresses to the layer 3 IP addresses. Routing and Ip-forwarding are done at layer 3 but the packets actually are sent/received/dropped as per MAC addresses, hence any packet needs to know the IPaddress to MAC mapping before sending it.

Read more

MrRobot Vulnhub writeup

This post entails about the walkthrough of getting root on a VM MrRobot which is present on VulnHub. This machine is at a beginner level, and one of the first machines that I broke on VulnHub. You are strongly recommended to try everything on your own before proceeding.

Read more

DLL Hijacking

Dynamic Linked Lists. Simply put, dynamic linked libraries are external libraries which are needed by a program during run time. There are different kinds of DLL's and are treated differently by the operating system as such. The APP_INIT DLL's are known trusted DLL's which are loaded from the registry before

Read more

Bandit Overthewire solution writeups

These are the easiest problems of the wargame prepping us for the reverse engineering and tougher challenges that lie ahead. We have a series of 34 machines to ssh into, and each machine holds the password to the next machine. It is highly recommended to solve the challenges on your own before proceeding to look for the solution. The solutions p...

Read more