1. Input for Pwn challenges ctf exploit
  2. Use command output as an argument ./myprogram `your_command_here // put a ` after the e ```./myprogram python -c 'print "A"*100'`` // put a after that last quote ./myprogram $(your_command_here) ./myprogram $(python -c 'print "A"*100') Use command as input your_command_here | ./myprogram (python »

  3. [Video] Malware Analysis: Basic Static Analysis Malware videos
  4. »

  5. Reverse Engineering: x86 and x64 reverseengineering
  6. Here is my notes on Practical Reverse Engineering chapter : x86 and x64 Operating systems uses rings to distinguish between privileges. Rings 0-3. Ring 0 = Highest privilege level (Kernel) Ring 3 = Lowest privilege level ECX - Counter In loops ESI - Source in string / memory operations EDI - Destination in string »

  7. Cracking Single Byte Repeated Xor ctf tutorial
  8. Update 3/29: If hex encoded string you can use this script credit(https://repl.it/@sfb/single-byte-xor-cipher): encoded = '1b37373331363f78151b7f2b783431333d78397828372d363c78373e783a393b3736' import binascii nums = binascii.unhexlify(encoded) strings = (''.join(chr(num ^ key) for num in nums) for key in range(256)) print(max(strings, key=lambda s: s.count(' »

  9. GDB Cheat Sheet ctf
  10. Here is a list of GDB commands for quick reference when reverse engineering. I will update this accordingly. UPDATE : install gdb peda! (https://github.com/longld/peda) Set commands (gdb) b ptrace Breakpoint 1 at 0x8111a441: (gdb) command 1 >set ($eax) = 0 >step >end (gdb) Set disassembly »