TECHNICAL Reverse Analysis under Linux - A First Look Dive into the intricacies of reverse analysis on Linux with fairycn, mastering tools like gcc, edb-debugger, and ghidra in UOS Home Edition 21.3, while delving into command parsing, debugging, and decompilation techniques.
TECHNICAL Featured HTB Shared Walkthrough Andy From Italy gives a complete step-by-step guide on the Hack The Box Shared Walkthrough.
TECHNICAL Featured A Guide to Malware Analysis: Day 4 Security researcher fairycn reveals how to conduct malware analysis and mitigate malware threats from Word Macro viruses to Linux viruses, as well as exploit overflow vulnerabilities.
TECHNICAL A Guide to Malware Analysis: Day 3 Get deeper into malware analysis with security researcher fairycn and learn about dll injection, how to use the Huorong System Diagnostics Toolkit for monitoring, and how malware leverages networks for remote attacks.
TECHNICAL A Guide to Malware Analysis: Day 2 On day two of Malware Analysis, fairycn unveils program static analysis, string checking, PE structure, and linking methods, including tools and techniques for shelling, obfuscation, and anti-obfuscation.
TECHNICAL Featured A Guide to Malware Analysis: Day 1 Security researcher fairycn delivers a comprehensive guide to malware analysis, explaining how to understand and prevent computer viruses.
TECHNICAL An Introduction to Buffer Overflow #3 : (Un)Winding of Stack In the third part of the Buffer Overflow series, Gurkirat Singh delivers a detailed explanation on how to (un)wind a stack and prevent a type of buffer overflow attack called stack canaries. Pentesters and security enthusiasts will love this!
TECHNICAL HTB Inject Walkthrough Learn how to execute a path traversal attack on a web server and do much more naughty stuff with the retired HTB Inject BOX!
CTF Featured Can an AI win a CTF? ChatGPT vs HTB! Can ChatGPT outsmart a CTF challenge? Dive into security researcher Andy From Italy's journey to uncover the AI's potential against Hack the Box!
TECHNICAL HTB Investigation Walkthrough Explore the world of reverse engineering with our HTB Investigation Walkthrough, as we navigate layered security and unveil critical cyber strategies, from masterful enumeration to deft privilege escalation.
TECHNICAL HTB Noter Walkthrough Master the art of flask cookie forging and exploit the power of MySQL in this comprehensive Hack The Box Noter Walkthrough.
TECHNICAL RKE: How To Hack A Car Remote Keyless Entry (RKE) systems are basically radio remote controls capable of making a car open or close its doors, and even start the engine.
TECHNICAL AP Faker: Arduino project The purpose of this educational project is to create a fake Access Point that can blend in alongside a public Access Point.
TECHNICAL HTB Trick Walkthrough A technical walk through of the HackTheBox TRICK challenge by Andy from Italy.
TECHNICAL Getting started with the MITRE ATT&CK Framework MITRE ATT&CK is a knowledge base of adversary tactics and techniques based on real-world observations.
TECHNICAL HTB Shibboleth Walkthrough A technical walkthrough of the HackTheBox SHIBBOLETH challenge from the King of HTB Andy From Italy.
TECHNICAL Windows Post Exploitation - WDigest Credentials Cache Learn how to enable WDigest credential caching and Metasploit to retrieve the plain text password of logged-in users.
TECHNICAL HTB Late Walkthrough A technical walkthrough of the HackTheBox LATE challenge from the King of HTB Andy From Italy.
TECHNICAL The JWT and Base64 Secrets You Need To Know Welcome to my guide to the JWT and Base 64 secrets you absolutely need to know if you hack.
TECHNICAL Defender Bypass With .PIF Extensions Learn a new method for bypassing Windows Defender security mechanisms using PIF extensions.
TECHNICAL Windows Post Exploitation & Clipboard Manipulation A lab exercise in Windows post exploitation techniques, covering manipulation of the clipboard.
TECHNICAL HTB OpenSource Walkthrough Andy From Italy is back with another epic HackTheBox walkthrough, this time he takes on the OpenSource box.
TECHNICAL Windows Post Exploitation - Create Files and Log Keystrokes Learn how to create files on the target machine using meterpreter, change the file timestamps, and log key strokes on the target system.
TECHNICAL HTB RouterSpace Walkthrough Andy from Italy is back with another HackTheBox technical writeup, this time he takes on the Routerspace.
TECHNICAL Windows Post Exploitation - Enabling WinRM Learn how to access a vulnerable application, even if the initial application vulnerability is patched.