Obscurcissement, injection et shellcode: Le hacking sous l’oeil de l’assembleur x64 – Book Review

This review is in french because the book only exists in french 😎 J’avais vu l’annonce de ce livre à en septembre 2023 via LinkedIn et je l’avais commandé sur Amazon en me disant que je le lirai plus tard. Etant coincé chez moi toute la semaine à cause d’un mal de dos épouvantable, j’en

Obscurcissement, injection et shellcode: Le hacking sous l’oeil de l’assembleur x64 – Book Review Read More »

DeadSec CTF 2024 – Mic check

This is a small write-up of the “Mic check” challenge from DeadSec CTF 2024 (Misc Category). The difficulty was easy and it was a kind of stuff that appears often in CTF challenges. Description : mic is it ok?mic is it ok? A link is to start a docker container and the command to connect

DeadSec CTF 2024 – Mic check Read More »

SANS FOR610 Training & GREM – Certification Review

SANS FOR610 Training The full name of the FOR610 training from SANS is “Reverse-Engineering Malware: Malware Analysis Tools and Techniques”. The goal is to learn how to efficiently analyze malwares in various forms (mainly Windows and Script files) depending on what is the purpose of the analysis : to understand how a security incident started,

SANS FOR610 Training & GREM – Certification Review Read More »

MS Office Documents Analysis

*.doc MS Word Document in binary proprietary file format (Compound File Binary Format) used in Office < 2007 *.xls MS Excel Workbook in binary proprietary file format (Compound File Binary Format) used in Office < 2007 *.docx MS Word Document in “Microsoft Office Open XML” file format used since Office 2007, no macro.Zip container with

MS Office Documents Analysis Read More »

SEETF 2022 – Sniffed Traffic

This is a small write-up of the “Sniffed Traffic” challenge from SEECTF 2022 (Forensics Category). Description : Author: EnyeiWe inspected our logs and found someone downloading a file from a machine within the same network.Can you help find out what the contents of the file are?For beginners: https://www.javatpoint.com/wiresharkMD5: 71cd3bdbecece8d7919b586959f2d3b7 Solution : Once the capture file

SEETF 2022 – Sniffed Traffic Read More »

picoCTF 2022 – x-sixty-what

This is a small write-up of the “x-sixty-what” challenge from picoCTF 2022 (Binary Exploitation Category). The challenge is now available in picoGym here ! Description : Overflow x64 code Most problems before this are 32-bit x86. Now we’ll consider 64-bit x86 which is a little different! Overflow the buffer and change the return address to

picoCTF 2022 – x-sixty-what Read More »