02 Jul 2017
To either solve an RE challenge, or to be able to pwn it, one must
first analyze the given binary, in order to be able to effectively
exploit it. Since the binary might possibly be stripped etc (found
using file) one must know where to begin analysis, to get a foothold
to build up from.
Read more...
27 May 2017
Here, we take a look at "advanced" fuzzing (in comparison to a blind
fuzzer, as described in my "Basics of Fuzzing" note). While it also
modifies/mutates bytes etc, but it does so in a slightly smarter way
than the blind "dumb" fuzzer.
Read more...