Hacking For Ramen
308 subscribers
24 photos
2 videos
1 file
62 links
Journey from Zero to Hero.
Pentest, RE, ExploitDev, Malware Analysis.
Chat: https://t.iss.one/+43eHuXah_ZxjODBi
Download Telegram
A good day for some #binaryexploitation challenge, isn't it? Well, any day is a good one during the #adventofhacking!
In this level of #nebula we will debug a simple program with GDB to reveal the access token.
https://telegra.ph/Nebula---13-12-06
PortSwigger released the new category of challenges in their #Web Security Academy - file upload.
Let's hook in in today's #adventofhacking article:
https://telegra.ph/Remote-code-execution-via-web-shell-upload-12-08
https://xkcd.com/2347/
Relevant as never before…
#memes
That's it! That's the end of #adventofhacking series.
I hope you liked it, and maybe learned a thing or two.
Happy Holidays, local nodes! I wish you all the best!
See you all in new year!
Hello hackers,
I didn’t mean to do another post on holidays, but the end of the year is a perfect occasion to evaluate and celebrate even such a small win.

I’m a strong believer that people don’t care about other people goals and resolutions for the new year, but I can assure you there will be more cool and original content here in the future. So with this 101st post I’d like to thank all of you for being a part of that small community! It wouldn’t be possible without you, who could learn something from those posts. I hope you find this channel helpful. If you do, you can share some of the books (that are there for now), or a write-up to someone who could be interested in such stuff, so I will be more motivated to bake some more content.

I wish you all the best in the upcoming new year, and happy holidays!
Hello fellas,
January turned out to be a busy month for me, so it's been quiet here.
Plus, I got sidetracked with this Malware Analysis course.
Smash the fire emoji on that post if you want a review!
It's a great course
My next post will be about fuzzing anyway, as I’m preparing metering for a talk on a local meetup. Those are good resources to begin with:
Forwarded from IOSSec (cha1ned)
101 fuzzing. Thank you, bublik community! List will be updated.

[Academic articles]
link: https://github.com/0xricksanchez/paper_collection

[Conversations]
link: https://youtu.be/zDXyH8HxTwg
link: https://youtu.be/YV3jewkUJ54

[tutorials & workshops]
(@HackingForRamen contribution)
link: https://fuzzing.in/
link: https://github.com/antonio-morales/Fuzzing101
link: https://github.com/google/fuzzing

[afl internals]
link: https://afl-1.readthedocs.io/en/latest/
#fuzzing
I haven't posted for a while, but It's too big and I can't ignore it.
All versions of the Linux kernel since 5.8 are vulnerable to the DirtyPipe. By exploiting that vulnerability you can change any file, even protected ones, which essentially leads to the escalation of privileges. And yes, that includes Android phones too.
It was fixed in versions of Linux 5.16.11, 5.15.25 and 5.10.102.
DirtyCow v2.0, huh?

Read more:
https://dirtypipe.cm4all.com/
Hello everyone, it's been a while.
So many new people here, wow! Welcome!
I am planning to shake off the dust from this channel and post some stuff soon. The plan is to finish the series I have started already, and bring something new to the table. I'm currently working on the Dante Pro Lab from HackTheBox, and the idea is to combine the usual review (you can find the previous ones with the #review) but with some tips and useful commands and tools that could help you on your own journey.
I have been working with other things lately, most of which resulted in numerous talks on a local 2600 meetup. Sadly, I use the slide deck for my presentations only as support material, so it is probably not so much value in them apart from the talk itself. If you want to see them regardless, smash your favorite emoji on this post, and I will see what we can do about it.
But that is for another day. Today I would like to talk about something else. I am glad to see that link in many other chats/groups, and it seems that the infosec community is not only about memes and lame bug bounty tips, at least not always.

A fellow security enthusiast cocomelonc recently finished his practical book about Malware Development. All the profit from this book will be spent on his daughter's treatment. Check it out yourself:
https://cocomelonc.github.io/book/2022/07/16/mybook.html

TL;DR:
Digital book in a form of a .pdf file that covers:
- Malware development tricks and techniques
- AV evasion tricks
- Persistence techniques
He is asking 16$ for it, which is a good price for what you get if you ask me.
You can buy it via PayPal, but he also has crypto addresses if you for some reason prefer that way.
BTC address: 1MMDN38mheQn9h2Xa2H6hqMSfFYKW4nQUE
ETH address: 0xf6ed40f61b603a4b2ac7c077034053df4f718f37
XMR address: 87E2aD7P7FGiQrUdznXPqtH7enHywV8qm5kMqKziKLz8ECWZENE8ZV5JWRTJhA3RVS5rxSogRsd7z7yX2DMn29dR3Vfnjbj
If you can not afford it, this book is also available for free in his github repo.
I want to finish all the #Nebula challenges that left and get over it over with! My hands are itching to document more technical and hardcore stuff, but it feels so wrong to leave this series unfinished. Unclosed gestalt, I guess.

#binaryexploitation
https://telegra.ph/Nebula---14-07-25
It is only a few levels of #Nebula left, and I want to get it done already.
In the 15th level, we will play a bit with
strace
and found our way to the root shell by using a pretty common technique.
#binaryexploitation

https://telegra.ph/Nebula---15-09-13
Tools comes and goes, but methodology stays with you.
On my journey to learn exploit development I often feel lost and overwhelmed. You simple do not know what you are looking for, and it is not fun to spend weeks on something and come back empty handed.
I was curious if there is a methodology on how professional security researchers are doing their job. Of course, there is a pattern "fuzz it until you get a crash, analyze and exploit it, repeat", but you could not cover everything with fuzzing.
I was sure that there must be something, and I recently stumbled on this - an approach where you are utilize already known CVEs in a way that I never thought of. The idea is to treat CVEs as North Stars in vulnerability discovery and comprehension.
Check it out yourself, I found it insightful:
https://cve-north-stars.github.io/
Happy Friday everyone!

#exploitdev
Potato for dinner.
Yet another iteration of Local Privilege Escalation for Windows just got published! It can get you from Service Account to System in no time!

You can read more about it here: https://decoder.cloud/2022/09/21/giving-juicypotato-a-second-chance-juicypotatong/

PoC is available here: https://github.com/antonioCoco/JuicyPotatoNG

#pentest
Hello hackers,
It's a hundred of you here, wow. It might doesn't sound like much to you, but it was a personal milestone for me.
Thank you! I have so many cool ideas in the pipeline for this channel, so stay in touch!
Long story short, a want to make it more of a community place. Some of you could say that the hacking community is dead, which is partially true, but I refuse to give up and want to cultivate the bits of it that are left.

The worst thing that you can encounter in your journey is gatekeepers. Gatekeepers are usually the people who are telling you that you are not good enough or could not make it. Usually, but not always. Sometimes the worst gatekeeper is yourself, but sometimes it's also things that you can't control at all.
I know that for many of you the biggest gatekeeper right now is the current financial situation.
During my journey, I learned a ton from other people. People, who shared their knowledge and expertise with others. People, who had the goal to enable others to learn and grow.
Today I would like to do the same. Even if it would affect only a few people, I think it's worth it.
So here is the deal. To celebrate this personal milestone I would like to make a humble giveaway.
Post your favorite (doesn't have to be new) infosec/hacking-related meme in the comments here and I will select a few winners tomorrow.
Those winners will get a premium subscription to HackTheBox for a month.
Let's make each other smile in these dark times.
Thank you for this meme blast, folks!
As I promised, I'll provide all of you with the HackTheBox VIP+ subscription for a month!
You can get 1 Month VIP+ or 1 Month VIP and £5 for your next subscription.
Congratulations and kudos to @cXestXlaXvie, @Kiriknik, @hummelchen0!
I'll reach out to you shortly to get your email addresses to send out gift cards.
For the rest of you, don't worry if you missed the hype. We will surely do this again 👀