radare2 radare2 can do java I was once asked on my YT channel to do a Java crackme. It only took 7* months to fulfill this request. So, wile waiting for Part 4, Professor this
resources Ultimate list of resources for learning Reverse Engineering It supposed to be the list of resources to learn Reverse Engineering but there's a lot of such lists already in the wild. So this post will sometimes list links of resources to learn RE - kind of meta. In no particular order: https:
ghidra Automating Ghidra - part 2 In the last Automating Ghidra post we looked at how we can script Ghidra to do some mundane operations on the Memory Map of our binary. This time we will
pwntools Making pwnlib.gdb.attach work under WSL2 I'm doing my CTFing under Windows. I used to spawn a VirtualBox or Hyper-V with Ubuntu from time to time when needed or used Digital Ocean's droplet but since WSL
security Gynvael's challenges - Solutions to collection of small web security challs Recently Gynvael started to post little web challenges that are around topics of web security with NodeJs/Express (mostly) and Flask. Since I used to participate actively in Missions (that
ghidra Automating ghidra Ghidra is an awesome RE tool that quickly took off after its initial launch in 2019. It can display not only the disassembly of our binary but also have a
nes Solving Space Fights CTF Few months back I was solving a CTF challenge for the NES system. It was one of the Flare-On challenges for 2019. This time we will solve another one for
tamctf TAMUCtf - leaning tower There were multiple things wrong with this CTF but this one challenge was an interesting one. Windows binary, no noticeable entry point and no messages on screen. It's time to
debugging Debugging .Net applications without source code with dotPeek Symbol Server Few years ago I've made a video that demonstrates how one can debug (from Visual Studio) without having source code by using the dotPeek Symbol Server. You can see the
insomnihack Kaboom! This wasn't a difficult task but it had one tricky trick that made it took way more time than it should be required. We started with an exe file that
hitcon Core Dumb - HitCon 2019 Note: challenge was solved together with Disconnected. Damn it my flag checker is so buggy it destroyed the program itself 😱 All I left is a core dump file :( Could you
lego Hitcon 2019 Qualification - EV3 Arm It's one of those challenges that brings together two things that I like - this time it was reverse engineering nad lego bricks. What was the input in this challenge
flare-on Flare-On 2019 solutions/notes (upd. 11.02) I'm well aware that there's multiple write-ups/solutions presenting 2019's Flare-On solutions but I've decided to provide my own for two reasons. Firstly, to have some notes I can easily
SEGA Solving SEGA Genesis ROM CTF Challenge File fot the challenge can be downloaded from here. In order to run the file we need an emulator. There are few available but I've used gens. Probably a better
reversing Oldschool - CONFidence Teaser 2019 Gynvael did a survey lately to see what kind of assembly is taught in Polish universities, and if any of them is still teaching the old 8086. Let us extend
ctf Never ever be fooled to pay ransomware! — Has Your Android Phone Been Infected with Malware? — Yes! — It’s awful but we have a cure! #rev #forensics Solved together with: disconnect3d The challange was part of CTFZone 2018
radre2 Handling self-modifying code with radare2 This is a post that explains a little bit in details what was shown in the two videos that could be watched on my YT channel. If you haven't seen
gynvael GynvaelEN - Mission 023 - Solution Prefere videos? You can also watch it - if not, continue reading. Mission status: http://gynvael.vexillium.org/ext/43bf753f/mission023.txt We are given the package that consists of
ctf Stop KrkAnalytica - solution NeverLeaks is in danger and your help is needed! An anonymous hacker reported that Krakow Analytica company had prepared some actions to sabotage a befriended producer of aircraft tanks -
gynvael Gynvael - Mission 22 - Solution This was a hard one. Information about this mission can be found in stream #64 and the mission itself is here. It's in Polish but the most relevant information here
gynvael GynvaelEN - Mission 022 - Solution Blokchain. *Coin. Hot topis for today. The 22nd mission is about blokchain and about coins. SpyCoins. The mission can be found on Stream #49. The SpyCoin center is here: http:
gynvael Gynvael - Mission 021 - Solution The source for this mission can be found in stream 63. It is in Polish but it can be easily spotted that the main source is a PCAP file that
gynvael Finding "Praktyczna Inżyniera Wsteczna" last hidden flag. If you read this blog you can see that from time to time I participate in missions published by Gynvael Coldwind on his English and Polish streams. You might not
solution Assembly job offer... "Follow the white rabbit" solution In a cold Novemeber night I was standing at a bus stop and saw and advertisement on the streets of Wrocław. What was odd about it it was written purely
gynvael Gynvael - Mission 015 - Solution Last time, there was no mission on EN stream, so I've decided to describe the one from PL stream sice it was also quite a nice one. The mission is