Introduction This post is going to cover some basic mathematical operations within intel’s 64 bit Assembly language. We’ll cover – Multiplication Division Addition Subtraction (the title should really have been MDAS, but that sounded a bit mad so I clickbaited you. ASM doesn’t have parenthesis anyway 🤷♀️) Let’s get to it, budding ASMer. Addition ASM
Introduction This post will cover another fundamental building block of the ASM language (almost all flavours of ASM, too) – the stack.At the end of this post, you’ll be in a position to understand even more reverse engineered applications. What’s the purpose of the stack? When reading the previous posts, you might have wondered to
Introduction This post will be a short primer on some of the basic building blocks of the x64 assembly language (and also x32, because they share a lot of the same building blocks) The instructions covered in this post will genuinely cover 80-90% of the code which you’ll see in the vast majority of applications
Introduction This post will be a quick whistle-stop tour of the following two concepts – Registers (variables!) CPU Flags What are registers? OK, but what ARE registers? On 64 bit intel CPUs, the (everyday, normal, non-scary-and-weird) registers can be seen in the table below. All of these registers are 64 bits (8 bytes) wide, which
Introduction Any 64 Bit Linux Distribution I’m partial to Debian based distributions because they Just Work(tm). I’ll be using the most recent version of Ubuntu for this tutorial series, with the Terminator terminal and the solarized theme. Terminator because it makes split terminals easy, and solarized because it’s easy on my eyes and it looks
Introduction What does 64 bit mean? Why does it matter? What’s Assembly? Basically, Assembly (henceforth abbreviated to ASM because I’m lazy), or more formally Intel’s ASM, is a programming language which is comprised of a large series of mnemonics which are assembled into opcodes, which are the raw instructions which are parsed by your computer’s
Introduction Today I’ll be demonstrating the process to fully compromise the Bulldog 2 VM created by @frichette_n This was a fun box, and was probably the first challenge VM I’ve attacked which had a realistic volume of data within (15,000 users…!). Overall I learned a lot from this VM and I hope you all learn something from
Introduction Today we’re going to be looking at the Node VM created by @iamrastating and hosted with love by vulnhub.com. This was my first (I think?) NodeJS application assessment and I was VERY EXCITED. Let’s get to it!
Introduction Today we’re going to thoroughly pwn the Temple of Doom: 1 VM from Vulnhub, created by 0katz. This box was fun and had some swish ASCII art to boot, I learned a tonne from it and I hope that you learn something from this write up! Let’s get to it.
Introduction Apologies again for the hiatus between write-ups, life got busy again and I had to do some preparation for my SANS security course next month (!!!!) Today we’ll be pwning the BoB 1.0.1 VM from Vulnhub, created by c0rruptedb1t! Let’s get to it =]