Using a PIE binary as a Shared Library — HCSC-2020 CTF Writeup

InfoSec Write-ups - Medium-- Using a PIE binary as a Shared Library — HCSC-2020 CTF WriteupThe challenge “Baseline test” was a great reverse engineering challenge with hard difficulty at the Hungarian Cyber Security Challenge 2020 CTF Qualifiers hosted by the National Cyber-Security Center of Hungary on the platform Avatao Next.The challengePoints: 300Difficulty: hardAnswer some simple questions.InstructionsThe baseline test is … Continue reading Using a PIE binary as a Shared Library — HCSC-2020 CTF Writeup

TryHackMe: RootMe Write-up

InfoSec Write-ups - Medium-- Beginner Level CTFIn this is a write-up of RooTMe, a THM beginner level challenge. Without any delay, let’s connect to our THM OpenVPN network and start hacking!!!Task 1 Deploy the machineDeploy the machine, and you will get your machine IP address. Your machine takes at least 2 mins to set up.Task 2 ReconnaissanceScan your … Continue reading TryHackMe: RootMe Write-up

New Framework Released to Protect Machine Learning Systems From Adversarial Attacks

The Hacker News-- Microsoft, in collaboration with MITRE, IBM, NVIDIA, and Bosch, has released a new open framework that aims to help security analysts detect, respond to, and remediate adversarial attacks against machine learning (ML) systems. Called the Adversarial ML Threat Matrix, the initiative is an attempt to organize the different techniques employed by malicious adversaries in subverting … Continue reading New Framework Released to Protect Machine Learning Systems From Adversarial Attacks