Hacking For Ramen
308 subscribers
24 photos
2 videos
1 file
62 links
Journey from Zero to Hero.
Pentest, RE, ExploitDev, Malware Analysis.
Chat: https://t.iss.one/+43eHuXah_ZxjODBi
Download Telegram
This year's Humble Hacking Bundle is here! It's getting better in better every year, I like that.
Check it out, some dang good #books about hacking
https://www.humblebundle.com/books/hacking-by-no-starch-press-books
December is here! What does it mean? Christmas and the new year are coming!
I had an idea to do some sort of hacking advent calendar, maybe a bit similar to THM's Advent of Cyber. Maybe not.
The Idea is to do some challenges every day from December 1st right until Christmas. Or maybe share some goodies with you!
It is going to be fun, that's for sure!
A good day for some #binaryexploitation challenge, isn't it? Well, any day is a good one during the #adventofhacking!
In this level of #nebula we will debug a simple program with GDB to reveal the access token.
https://telegra.ph/Nebula---13-12-06
PortSwigger released the new category of challenges in their #Web Security Academy - file upload.
Let's hook in in today's #adventofhacking article:
https://telegra.ph/Remote-code-execution-via-web-shell-upload-12-08
https://xkcd.com/2347/
Relevant as never before…
#memes
That's it! That's the end of #adventofhacking series.
I hope you liked it, and maybe learned a thing or two.
Happy Holidays, local nodes! I wish you all the best!
See you all in new year!
Hello hackers,
I didn’t mean to do another post on holidays, but the end of the year is a perfect occasion to evaluate and celebrate even such a small win.

I’m a strong believer that people don’t care about other people goals and resolutions for the new year, but I can assure you there will be more cool and original content here in the future. So with this 101st post I’d like to thank all of you for being a part of that small community! It wouldn’t be possible without you, who could learn something from those posts. I hope you find this channel helpful. If you do, you can share some of the books (that are there for now), or a write-up to someone who could be interested in such stuff, so I will be more motivated to bake some more content.

I wish you all the best in the upcoming new year, and happy holidays!
Hello fellas,
January turned out to be a busy month for me, so it's been quiet here.
Plus, I got sidetracked with this Malware Analysis course.
Smash the fire emoji on that post if you want a review!
It's a great course
My next post will be about fuzzing anyway, as I’m preparing metering for a talk on a local meetup. Those are good resources to begin with:
Forwarded from IOSSec (cha1ned)
101 fuzzing. Thank you, bublik community! List will be updated.

[Academic articles]
link: https://github.com/0xricksanchez/paper_collection

[Conversations]
link: https://youtu.be/zDXyH8HxTwg
link: https://youtu.be/YV3jewkUJ54

[tutorials & workshops]
(@HackingForRamen contribution)
link: https://fuzzing.in/
link: https://github.com/antonio-morales/Fuzzing101
link: https://github.com/google/fuzzing

[afl internals]
link: https://afl-1.readthedocs.io/en/latest/
#fuzzing
I haven't posted for a while, but It's too big and I can't ignore it.
All versions of the Linux kernel since 5.8 are vulnerable to the DirtyPipe. By exploiting that vulnerability you can change any file, even protected ones, which essentially leads to the escalation of privileges. And yes, that includes Android phones too.
It was fixed in versions of Linux 5.16.11, 5.15.25 and 5.10.102.
DirtyCow v2.0, huh?

Read more:
https://dirtypipe.cm4all.com/
Hello everyone, it's been a while.
So many new people here, wow! Welcome!
I am planning to shake off the dust from this channel and post some stuff soon. The plan is to finish the series I have started already, and bring something new to the table. I'm currently working on the Dante Pro Lab from HackTheBox, and the idea is to combine the usual review (you can find the previous ones with the #review) but with some tips and useful commands and tools that could help you on your own journey.
I have been working with other things lately, most of which resulted in numerous talks on a local 2600 meetup. Sadly, I use the slide deck for my presentations only as support material, so it is probably not so much value in them apart from the talk itself. If you want to see them regardless, smash your favorite emoji on this post, and I will see what we can do about it.
But that is for another day. Today I would like to talk about something else. I am glad to see that link in many other chats/groups, and it seems that the infosec community is not only about memes and lame bug bounty tips, at least not always.

A fellow security enthusiast cocomelonc recently finished his practical book about Malware Development. All the profit from this book will be spent on his daughter's treatment. Check it out yourself:
https://cocomelonc.github.io/book/2022/07/16/mybook.html

TL;DR:
Digital book in a form of a .pdf file that covers:
- Malware development tricks and techniques
- AV evasion tricks
- Persistence techniques
He is asking 16$ for it, which is a good price for what you get if you ask me.
You can buy it via PayPal, but he also has crypto addresses if you for some reason prefer that way.
BTC address: 1MMDN38mheQn9h2Xa2H6hqMSfFYKW4nQUE
ETH address: 0xf6ed40f61b603a4b2ac7c077034053df4f718f37
XMR address: 87E2aD7P7FGiQrUdznXPqtH7enHywV8qm5kMqKziKLz8ECWZENE8ZV5JWRTJhA3RVS5rxSogRsd7z7yX2DMn29dR3Vfnjbj
If you can not afford it, this book is also available for free in his github repo.
I want to finish all the #Nebula challenges that left and get over it over with! My hands are itching to document more technical and hardcore stuff, but it feels so wrong to leave this series unfinished. Unclosed gestalt, I guess.

#binaryexploitation
https://telegra.ph/Nebula---14-07-25
It is only a few levels of #Nebula left, and I want to get it done already.
In the 15th level, we will play a bit with
strace
and found our way to the root shell by using a pretty common technique.
#binaryexploitation

https://telegra.ph/Nebula---15-09-13
Tools comes and goes, but methodology stays with you.
On my journey to learn exploit development I often feel lost and overwhelmed. You simple do not know what you are looking for, and it is not fun to spend weeks on something and come back empty handed.
I was curious if there is a methodology on how professional security researchers are doing their job. Of course, there is a pattern "fuzz it until you get a crash, analyze and exploit it, repeat", but you could not cover everything with fuzzing.
I was sure that there must be something, and I recently stumbled on this - an approach where you are utilize already known CVEs in a way that I never thought of. The idea is to treat CVEs as North Stars in vulnerability discovery and comprehension.
Check it out yourself, I found it insightful:
https://cve-north-stars.github.io/
Happy Friday everyone!

#exploitdev