Using a PIE binary as a Shared Library — HCSC-2020 CTF Writeup

InfoSec Write-ups - Medium-- Using a PIE binary as a Shared Library — HCSC-2020 CTF WriteupThe challenge “Baseline test” was a great reverse engineering challenge with hard difficulty at the Hungarian Cyber Security Challenge 2020 CTF Qualifiers hosted by the National Cyber-Security Center of Hungary on the platform Avatao Next.The challengePoints: 300Difficulty: hardAnswer some simple questions.InstructionsThe baseline test is … Continue reading Using a PIE binary as a Shared Library — HCSC-2020 CTF Writeup

TryHackMe: RootMe Write-up

InfoSec Write-ups - Medium-- Beginner Level CTFIn this is a write-up of RooTMe, a THM beginner level challenge. Without any delay, let’s connect to our THM OpenVPN network and start hacking!!!Task 1 Deploy the machineDeploy the machine, and you will get your machine IP address. Your machine takes at least 2 mins to set up.Task 2 ReconnaissanceScan your … Continue reading TryHackMe: RootMe Write-up

Basic Fortigate Firewall Configuration

InfoSec Write-ups - Medium-- ( Beginners Guide part 2)In the first part of our “Fortigate basic configuration guide”, we looked at administrator set up, interface configuration with DHCP service running that will lease ip addresses to your clients, and finally, we have configured a firewall address object for a specific device on our subnet, My Mac book.We … Continue reading Basic Fortigate Firewall Configuration