But we could never forget about those Binary Exploitation buffs! In fact we've got something fun for you: @RagnarSecurity 's latest predicament: "So Much Cache!" Pwn this challenge and more at #NahamCon2024 CTF jh.live/nahamcon-ctf (5/23-5/25)
Leveraging Netsh Helper DLLs for living-off-the-land code execution (and optional persistence), staged with shellcode for a Sliver C2 session! Showcases built with both C++ and Nim... and boy I love getting practice with Nim 👑 youtu.be/lMihdys4jw8
WittsEnd2 created a new article about one of the CTF challenges he wrote. It is a basic code injection challenge using ptrace!
ragnarsecurity.medium.com/limited-resour…
It's that magical time of year again - UMDCTF 2022!!!
Starting March 4th check out some incredible challs from the folks at UMDCSEC!
Visit umdctf.io for more details <3
How to make money and be successful in #infosec and #bugbounty without any knowledge and skills of hacking, coding.
#bugbountytips #bugbountytip
A thread.
🧵👇
Something to finish off 2021 with a bang for you: It's now possible to build a (mostly safe) #EMFI tool for ~$50. Details are in the new 'PicoEMP' repository, including gerbers + design decision notes. Inspired from my @hackaday remoticon talk! github.com/newaetech/chip…
WittsEnd2 is writing a series about developing baremetal firmware. He just completed his first article. You can read it here: ragnarsecurity.medium.com/writing-bareme…
Ever wanted to know how the kernel security feature Seccomp works? WittsEnd2 will teach you and go through a CTF challenge involving Seccomp!
link.medium.com/LDKEzneI5ib
Interesting writeup from the Hack-A-Sat 2 Qualifiers CTF. This writeup is for the challenge Mars or Bust, which is an embedded reverse engineering challenge:
gist.github.com/ZetaTwo/d437be…
WittsEnd2 just posted part 3 of his reverse engineering bare-metal tutorial series. This tutorial goes into reading ARM assembly code and exploiting bare-metal firmware vulnerabilities.
ragnarsecurity.medium.com/reverse-engine…
WittsEnd2 just published a new article related to reverse engineering bare-metal kernel images using QEMU. Click here to read: link.medium.com/uZWZOnQkpfb
The attackers behind Solorigate detached the execution of the 2nd-stage payload, a custom Cobalt Strike loader, from the compromised binary’s process by creating an IFEO Debugger registry value for dllhost.exe and waiting for it run. ICYMI, our analysis: msft.it/6013psLtW
979 Followers 2K FollowingComputational biology, data, programming, security, EE, RF and other braindumplings. Born at 341ppm. All opinions are your own.
brainstorm at nopcode dot org
233K Followers 1K FollowingCofounder @hackinghub_io | Advisor @CaidoIO. I hack companies and make content about it. #NahamCon organizer. ex @hacker0x01🇮🇷
48K Followers 452 FollowingSecurity researcher with a focus on hardware & firmware. I occasionally publish stuff on YouTube. Co-founder of @hextreeio. Contact: [email protected]
10K Followers 1K FollowingActive on: [email protected] (Mastodon) or @oflynn.com (BSky). Not responding here, but keeping profile to keep historical messages online.
314K Followers 2K FollowingIf you can keep your head when all about you are losing theirs & blaming it on you…
NOT TRADING ADVICE
https://t.co/l29nWovEkm
27K Followers 22 FollowingShmooCon 2025 is Jan 10-12. This account is used primarily to push information. Got questions? Email us at info @ https://t.co/4QO2tJpuhL
2K Followers 62 FollowingAustralia's largest CTF, born of 13 different Australian higher-education societies. Aimed at Tertiary and Secondary but open to everyone!
325K Followers 119 FollowingEmpowering the world to fight cyber threats with indispensable cybersecurity skills and resources. Build the path to a secure future with OffSec.
14K Followers 915 FollowingWindows Internals expert, author, and trainer. Teaching system programming & debugging at TrainSec. Check out my books & courses! 🚀 #WindowsInternals #TrainSec
89K Followers 910 FollowingProgrammer, #malware analyst. Author of #PEbear, #PEsieve, #TinyTracer. Private account. All opinions expressed here are mine only (not of my employer etc)
38K Followers 3K FollowingTech Director / Threat Intelligence at Microsoft. Previously, Director of Incident Response & Intel Research at Mandiant. Former Chief Technical Analyst at CISA
6K Followers 274 FollowingSenior Security Consultant @ Mandiant (part of Google Cloud). Tweets attributable to me — not current or former employers. Honneur de vous rendre compte.
11K Followers 79 FollowingUK's best combined Information Security Conference and training event. Newsletter https://t.co/2P1WTeSK4E run by @alien8 https://t.co/lXrBRhPg83