Infosec Blog
I like to do reverse engineering
Introduction to ROP Introduction to ROP
This blog post will let you know about the ROP or Return Oriented Programming. What is ROP?Return Oriented Programming
2019-07-24
Vulnhub - Pumpkin Festival Vulnhub - Pumpkin Festival
Today, we are going to pwn Pumpkin Festival from Vulnhub. NmapStarting off with the nmap using nmap -sV -sC -A -p- -T5 1
2019-07-24
Vulnhub - Symfonos-2 Vulnhub - Symfonos-2
Today, we are going to pwn Symfonos 2 from Vulnhub. NmapStarting off with Nmap, using nmap -sV -sC -A -p- -T5 192.168.43
2019-07-20
Vulnhub - PumpkinRaising Vulnhub - PumpkinRaising
Today, we are going to pwn PumpkinrRaising from Vulnhub. NmapStarting off with nmap and using nmap -sV -sC -A -p- -T5 19
2019-07-17
Hack The Box - Friendzone Hack The Box - Friendzone
Today, we are going to pwn Friendzone from Hack The Box. Methodology Nmap scan of the machine Checking SMB service and
2019-07-12
Vulnhub - Silky CTF 0x01 Vulnhub - Silky CTF 0x01
Today, we are going to pwn Silky CTF: 0x01 from Vulnhub. Methodology Host Discovery Nmap Scan of the machine Checking fo
2019-07-08
Vulnhub - Symfonos Vulnhub - Symfonos
Today, we are going to pwn Symfonos from Vulnhub. Machine SetupNothing much to setup in the machine, just import it to V
2019-07-06
Binary Exploitation - Format String + Buffer Overflow Vulnerability Binary Exploitation - Format String + Buffer Overflow Vulnerability
A detailed guide to use a format string vulnerability to bypass protections and use the buffer overflow vulnerability to
2018-09-12
layout: posttitle: “Vulnhub - MinU V2”date: 2019-07-26author: “D4mianwayne”tag: nmap, ctf, vulnh
1970-01-01 D4mianWayne
2 / 2