The question that might come naturally after reading this title is:Why should you know how to code a shellcode runner for your malware analysis? Malware analysis is a dark art....
In this article I want to introduce you to command injection with a very simple practical example.I also suggest you read the code of the target application in order to...
This article is an introduction to what is Cyber Kill Chain and how it works. Maybe if you follow some cybersecurity podcast, newsletter etc. you have heard about that, but...
What is SQL injection? SQL injection (SQLi) is an attack on a web application (among the most known along with XSS) that exploits a security vulnerability in a target software,...
Are you familiar with malware analysis? It's an essential aspect of cybersecurity that deserves a closer look. In this article, we'll provide a concise yet comprehensive overview of malware analysis...
Just as a quick refresh: Cross-site scripting (XSS) is a type of computer security vulnerability typically found in Web applications. XSS enables attackers to inject client-side scripts into Web pages...
Dive into the exciting world of Capture The Flag (CTF) challenges with the PicoCTF puzzle "Hurry up! Wait!". This unique challenge asks you to find a hidden flag in a...
This article aims to be a quickstart guide about GDB, a crucial tool for reverse engineering. We will closely examine a puzzle from PicoCTF, the 'GDB Test Drive' challenge. But,...
Navigating the internet can be full of surprises. We find amazing discoveries and clever scams. One trick involves a Python tool called mitmproxy. Some online "financial gurus" use it. They...
In the world of cybersecurity, a robust firewall is crucial for protecting your network from potential threats. Iptables is a powerful and widely used Linux firewall solution that offers extensive...
Welcome back to the exciting world of reverse engineering! In this article, we will tackle the picoCTF asm3 challenge, a slightly more complex task than the previous ones (asm1, asm2)....
Welcome to the world of reverse engineering! This crucial skill helps cybersecurity experts safeguard systems and discover vulnerabilities. In this post, we dive into picoCTF, a captivating platform for learning...
StackZero is a technical coding blog that focuses on cybersecurity. It mainly offers articles and tutorials that teach readers how to write security tools.
The blog covers a wide range of topics, from the basics of cryptography to the more advanced topics of exploitation and reverse engineering.