Elevate your SOC: Key Steps to Kickstart Threat Hunting
In today’s rapidly evolving cyber landscape, the traditional, reactive approach to security just doesn’t cut it anymore. For cyber professionals seeking to shift paradigms, proactive […]
In today’s rapidly evolving cyber landscape, the traditional, reactive approach to security just doesn’t cut it anymore. For cyber professionals seeking to shift paradigms, proactive […]
What is DORA? DORA stands for the Digital Operational Resilience Act. It is the framework introduced by the European Commission to manage ICT risks and […]
Hey, It’s been a busy month for me and I was not able to save time to write the final part of the series on […]
Recap In the previous post, we wrote a simple CMD Reverse Shell over TCP. However, in a real-life scenario, things would be pretty different. In […]
The Prologue This is my reposting of the blog series I wrote here at ScriptDotSh If you haven’t watched the videos yet, here are my […]
Prologue In the previous blogpost, we reverse engineered a binary and extracted the password from within it. This binary however contained a plaintext password. This […]
As you might already be aware that ARM powers a variety of low-powered devices around us, including but not limited to, phones, routers, IoT devices, […]
Prologue In the previous blog here, we reverse engineered a simple binary containing plaintext password in Linux with the help of GNU Debugger (GDB). In […]
Prologue The main focus of this blog is to give a push start to the beginners to get in the field of reverse engineering. Since […]
Few months back, I had the opportunity to conduct two workshops at BSidesDelhi and CSI Mumbai on the above topic. Both sessions were great experiences […]