ZH3RO CTF Baby ARM ROP Challenge [pwn]
A walkthrough that’s walking through a walkthrough
The simplest way to find specific content is to simply search, just press the search icon in the top right of the page and start typing. Easy!
Alternatively, there are a few clever ways to browse blog content:
You can simply browse articles by date; this is great if you want to browse and just see what the blog is all about. Posts are organised by year and you’ll see the most recent content first.
Posts are assigned categories and you can browse these to find content. This can help if you’re interested in technical content only, or if you’re looking for general guidance.
Posts are assigned tags which you can browse. This can help if you’re interested in specific technologies or subjects; you may find this helpful to learn about, say Python, Windows or passwords.
I’ve collected my own notes and resources for years relating to security, coding and technology, but have decided to collate them online; I hope this will help me pass them to new starts at work, students and mentees, friends just looking for advice, or maybe even just for me when I forget something.
That means that if you’re reading this, I’m blogging in the hope that my posts can help you!
I’ve been reading blogs for as long as I’ve been online and this has taught me that posts must be useful to someone; in my efforts to add value, you’ll see walkthroughs, technology guides, advice, and (hopefully) some guest posts too.
My articles will sometimes be helpful for regular folk’s personal security, sometimes for security professionals, or perhaps they’ll be general discussions and statements into the ether. Who knows what the future will hold?
I want to give you, the reader, value; if you have thoughts, requests or complaints, get in touch via any of the social links on this page and let me know!
Nothing! That said, this is my hobby and passion; I live security, tech and problems, so why not try some content and see what I’m about?
A walkthrough that’s walking through a walkthrough
Make a move into binary exploitation CTFs and challenges
Employee Manager PWN Challenge
A Workflow for solving shellcode challenges
New tool who dis?
Building a miniature web hacking lab.
Cyber self defence - Level 2.
Capture The Flag Walkthrough
Build and configure your personal InfoSec playground.
Finding your path to enlightenment.
Cyber self defence - Level 1.
Why passwords can be frustrating and what to do about it.
Hello, World!