The art of cyber warfare is a constantly evolving domain, with new techniques and tools emerging every day. In the nefarious world of hacking and cybercrime, DLL Injection is one of the most prominent and widely used techniques. This blog post aims to dissect the nature of DLL (Dynamic Link Library) Injection Attacks.
Linux system programming is a fascinating field that allows developers to interact with the underlying operating system and harness its power to build robust and efficient applications. By understanding the concepts and principles of Linux system programming, developers can take full advantage of the capabilities offered by the Linux operating system.
In this blog post, we will see the solution of a Hack-The-Box reversing challenge called “Impossible Password”. Its been a long time solving some reversing puzzles :)
In this post, I will show how I resolve the machine called Brainfuck. The difficulty of this macihne is hard.
In this post, I will show how I resolve the machine called LAME. The difficulty of this macihne is easy. This is my first post about the hack the box machines. I will write more writeups about HTB macihnes.
Vulnerability scan tools you identify vulnerabilities in your infrastructure. You can perform manual and automated scans. But, in some cases, you may need to integrate your scannner with another tool such as devops pipeline (jenkins) or VM build pipeline.
if you are using Docker in your local or remote ennvironment, sometimes you might have trouble to manage Docker images and containers. I want to share a small cheatsheet that I used. I think this is very short and usefull cheatsheet.
Secret scanning is an essential process before application deployment. You need to check any information left in the code, such as password, keys, etc. There are many tools to identify secrets. Whispers are one of those tools, and it is opensource. But this is a command-line tool.