TECHNICAL Age Verification: An Analysis of its Effectiveness & Risks Age verification laws have been suddenly rolling out in the USA. In this article, we will navigate through a complex analysis, as I seek to stimulate your thoughts rather than impose conclusions. Today's discussion centers on age verification protocols implemented on pornography websites.
TECHNICAL HTB Pilgrimage Walkthrough Search for flags using tools like nmap and ImageMagick, identify vulnerabilities, exploit them, find user credentials, and capture flags. Happy hacking the box!
HTB Timelapse Walkthrough I solved the hack-the-box for a Windows machine that was giving me problems. This is how I solved it to get the admin password.
TECHNICAL Rhysida Ransomware Malware Analysis - Part 2: How to Decrypt In the second part of our malware analysis walkthrough of Rhysida ransomware, we will pick up where we left off from part 1 (analysis and debugging) and explore how to decrypt the ransomware.
TECHNICAL HTB Photobomb Walkthrough Explore this step-by-step Hack The Box walkthrough on exploiting vulnerabilities to gain unauthorized access to a system.
INFOSEC Understanding the Implications of the Europcar Data Breach In recent years, data breaches have become a concerning trend, affecting companies across various industries. One such incident involved Europcar, a prominent car rental company, which was embroiled in controversy following claims of a massive data breach affecting millions of its customers. However, as investigations unfolded, it became apparent that
TECHNICAL Featured An Introduction to Buffer Overflow #4: Overwriting the Stack Gurkirat Singh reveals how to overwrite the stack with buffer overflows and uncovers low-level vulnerabilities, providing detailed debugging insights.
TECHNICAL HTB UpDown Walkthrough Explore how Andy From Italy tackles the Hack The Box UpDown challenge, a Linux-based machine featuring exposed SSH and Apache servers.
TECHNICAL Reverse Analysis on Windows - A First Look Dig deep into advanced debugging with Visual Studio and x64dbg: breaking and modifying game rules on Windows, and mastering single-step analysis and instruction edits for optimized code execution.
TECHNICAL Reverse Analysis on Windows - Hands-on 1 fairycn explores the intricate process of bypassing battery detection during BIOS upgrades on the Thankpad T430I using Windows 10, diving deep into reverse analysis with tools like x64dbg and gleaning insights from real-world troubleshooting challenges.
TECHNICAL x64dbg usage log: start debugging and modify a program Explore the comprehensive guide by fairycn on how to master x64dbg on Windows 11, from installation to advanced debugging techniques, ensuring effective program modifications and insightful CPU disassembly analysis.
TECHNICAL Reverse Analysis under Linux - A First Look Dive into the intricacies of reverse analysis on Linux with fairycn, mastering tools like gcc, edb-debugger, and ghidra in UOS Home Edition 21.3, while delving into command parsing, debugging, and decompilation techniques.
TECHNICAL Featured HTB Shared Walkthrough Andy From Italy gives a complete step-by-step guide on the Hack The Box Shared Walkthrough.
TECHNICAL Featured A Guide to Malware Analysis: Day 4 Security researcher fairycn reveals how to conduct malware analysis and mitigate malware threats from Word Macro viruses to Linux viruses, as well as exploit overflow vulnerabilities.
TECHNICAL A Guide to Malware Analysis: Day 3 Get deeper into malware analysis with security researcher fairycn and learn about dll injection, how to use the Huorong System Diagnostics Toolkit for monitoring, and how malware leverages networks for remote attacks.
TECHNICAL A Guide to Malware Analysis: Day 2 On day two of Malware Analysis, fairycn unveils program static analysis, string checking, PE structure, and linking methods, including tools and techniques for shelling, obfuscation, and anti-obfuscation.
TECHNICAL Featured A Guide to Malware Analysis: Day 1 Security researcher fairycn delivers a comprehensive guide to malware analysis, explaining how to understand and prevent computer viruses.
TECHNICAL An Introduction to Buffer Overflow #3 : (Un)Winding of Stack In the third part of the Buffer Overflow series, Gurkirat Singh delivers a detailed explanation on how to (un)wind a stack and prevent a type of buffer overflow attack called stack canaries. Pentesters and security enthusiasts will love this!
TECHNICAL HTB Inject Walkthrough Learn how to execute a path traversal attack on a web server and do much more naughty stuff with the retired HTB Inject BOX!
CTF Featured Can an AI win a CTF? ChatGPT vs HTB! Can ChatGPT outsmart a CTF challenge? Dive into security researcher Andy From Italy's journey to uncover the AI's potential against Hack the Box!
TECHNICAL HTB Investigation Walkthrough Explore the world of reverse engineering with our HTB Investigation Walkthrough, as we navigate layered security and unveil critical cyber strategies, from masterful enumeration to deft privilege escalation.
TECHNICAL HTB Noter Walkthrough Master the art of flask cookie forging and exploit the power of MySQL in this comprehensive Hack The Box Noter Walkthrough.
TECHNICAL RKE: How To Hack A Car Remote Keyless Entry (RKE) systems are basically radio remote controls capable of making a car open or close its doors, and even start the engine.
TECHNICAL AP Faker: Arduino project The purpose of this educational project is to create a fake Access Point that can blend in alongside a public Access Point.
TECHNICAL HTB Trick Walkthrough A technical walk through of the HackTheBox TRICK challenge by Andy from Italy.