In a normal Windows/Linux environment, you have heard about moving data or files. What we do is copy data from a source location to a destination. The assembly MOV instruction is very similar to....
Today, I selected an interesting topic to discuss. Here, we are going to disassemble a binary file and take a look at what it does. This process is called reverse engineering. Let's run the program....
The Stack in Computer Science The stack is an important concept in computer science. If you are planning to learn reverse engineering, malware analyzing, exploitation, etc., this concept is a must to....
Understanding Remote Command Execution (RCE) Vulnerabilities Remote Command Execution (RCE) is a critical security vulnerability that allows an attacker to execute arbitrary commands on a remote....
In today’s post, we’ll walk through solving a basic crackme challenge using GDB. You can also solve this challenge on a Windows platform using IDA. I found a crackme collection on GitHub, and....
GDB is shipped with the GNU toolset. It is a debugging tool used in Linux environments. The term GDB stands for GNU Debugger. In our previous protostar stack0 walkthrough tutorial, we used GDB many....
Computer science
Web development
How to guides
Networking
Cryptography
Explorer the world of cyber security. Read some cool articles on System exploitation, Web application hacking, exploit development, malwara analysis, Cryptography etc.