Hacking For Ramen
308 subscribers
24 photos
2 videos
1 file
62 links
Journey from Zero to Hero.
Pentest, RE, ExploitDev, Malware Analysis.
Chat: https://t.iss.one/+43eHuXah_ZxjODBi
Download Telegram
I realized it's hard to keep up in series like that (because of the same picture, maybe?). They all look alike!
I'll try to add more context to each post for that sake.

In level 5 of Nebula wargame we will learn a bit about privileges in Linux, and how you can a private ssh key that you might find in the backup of a compromised computer.

#exploitdev #nebula
https://telegra.ph/Nebula---05-10-26
Tools comes and goes, but methodology stays with you.
On my journey to learn exploit development I often feel lost and overwhelmed. You simple do not know what you are looking for, and it is not fun to spend weeks on something and come back empty handed.
I was curious if there is a methodology on how professional security researchers are doing their job. Of course, there is a pattern "fuzz it until you get a crash, analyze and exploit it, repeat", but you could not cover everything with fuzzing.
I was sure that there must be something, and I recently stumbled on this - an approach where you are utilize already known CVEs in a way that I never thought of. The idea is to treat CVEs as North Stars in vulnerability discovery and comprehension.
Check it out yourself, I found it insightful:
https://cve-north-stars.github.io/
Happy Friday everyone!

#exploitdev