Hello everyone! I am actually on the train right now. There were quite a lot of people at the station so I was afraid to be late for the article. I have still no idea about what I could talk about, so It will probably be about interplanetary spacetravels and space architecture like usual (I’ve …
Search Results for: | py
Hi guys! I am a bit lazy tonight to write a long article. One week ago, I’ve started to put all my mind on the thesis so, yeah for 5 days, I was able to write 40 pages. Not bad, isn’t it? However not enough to finish everything, I need to write the two last …
Hi, I am going to be mad with this theory and project. I completely forget the 3D print challenge recently (2 years ago) organized by the NASA to build a concept of a habitat on Mars… It is NOT okay, come on, I don’t want to built again the wheel it is REALLY not what …
Hi guys! I love my workplace so much! With a cleaned room, some tea, chocolate and a lot of plants, I’ve never felt so relaxed. Gosh ♥. Today, I’ll try to talk about my master’s thesis (yup, once again) about space exploration and therapeutic architecture. Since I’ve met my professors for the feedbacks, a lot …
Hi, I’m creating a new category called “agt” for applied game theory. These articles will mostly be in my opinion a lot of thinking and figuring things out rather than learning something from a source. Today the subject will be economy in competitive games. What do I mean by economy? The economy could mean …
Hello everybody, today I’ll try to exploit a fastbin duplication attack, it is an attack pretty common in capture the flag events these days if I understand correctly and it will help me get into heap exploitation. This attack is pretty simple in theory so it can be easily explained. How does the attack …
Hi guys! I love to sleep and I am still drowning in my stressful environment since I am back in France, but heh it was a really good journey back then. Switzerland is a really good country with a lot of (maybe too much) kind people. I learn a lot from the guys I met, …
Hey, let’s keep going on our exploitation journey by talking about off-by-one. I’ll quickly speak about stack-based off-by-one and heap-based off-by-one. It is a subject I understand but I never really scratched the surface, even if I already did exploit stack off-by-one vulnerabilities before. What is an off-by-one? An off-by-one, if I had to …
Yo, it’s me again. It’s been almost one full month since we started that initiative. Let’s continue our return-oriented programming exploitation. Today we will try to create our ropchain manually and exploit our same binary. Preparations I will recompile the binary using a static library to have a lot more gadgets using the -static …
Hi, here’s a follow-up of the previous article I wrote on ret-to-libc. I found a solution to the issue I was having last time and I am finishing my exploit today. Previous bug and follow-up solution Last time, I had an issue where I did overwrite the buffer, however, I was not able to …