Latest Posts

Exploit Exercise’s Phoenix x64 VM – Stack One

In this post, I will be continuing the series on the Phoenix VM by exploit education by using radare2. The next challenge is called...
d3d
4 min read

Exploit Exercise’s Phoenix x64 VM – Stack Zero

In this post, I will be covering the first (of many) stack challenges on the Phoenix VM from exploit education. I will try to...
d3d
6 min read

Writing exploits for Konica Minolta FTP Server

In this post, I will be writing an exploit for the 32-bit versions of the Konica Minolta FTP server for Windows. In a recent...
d3d
9 min read

RedCisco – A Red Team Toolkit

In this post, I will be writing a new toolkit for red team operators that will assist in compromising Cisco IOS routers and the...
d3d
18 min read

Writing C from ASM Practice (while/loop)

In this challenge I will be taking a look at the ASM instructions from a program (while/loop) using both Intel and AT&T syntax. After...
d3d
2 min read

Writing C from ASM Practice (if/then)

In this challenge I will be taking a look at the ASM instructions from a 64-bit ELF executable (if/then) using both Intel and AT&T...
d3d
1 min read

Setting up GNS3 on Arch Linux

GNS3 is used by hundreds of thousands of network engineers worldwide to emulate, configure, test and troubleshoot virtual and real networks. It’s also a great...
d3d
51 sec read

Setting up the ‘PhanTap’

The ‘PhanTap’ is an ‘invisible’ network tap written by the guys at NCC Group and aimed at red teams. With limited physical access to...
d3d
2 min read
×

*NOTE*

I am currently updating the site, so posts will starting showing up from my previous blog very soon.