PinnedExploiting Linux systems with ptraceLinux comes with an interesting system call ptrace which can be abused to elevate privileges and steal sensitive information.Sep 10, 2022Sep 10, 2022
PinnedPython Security “logging.config” code executionPython’s Security Considerations document lists following about the logging moduleApr 1, 2022Apr 1, 2022
PinnedCTF Writeup: HackTheBox — RemoteIn 2020 (thanks to COVID lockdowns), I started working on HackTheBox challenges. It is too much fun! I finally got some time to go through…Jan 3, 2021Jan 3, 2021
Exploiting Python de-serialization to achieve RCEThe pickle module implements binary protocols for serialising and de-serialising a Python object structure.Feb 14, 2021Feb 14, 2021
CTF Writeup | NATAS 12 : PHP File upload vulnerabilityNATAS Level 12 presents you with a simple file upload functionality. You can upload an image and file and view it later in /upload…Feb 14, 2021Feb 14, 2021
CTF Writeup | NATAS #11 : PHP Weak EncryptionI started with capture the flag (CTF) exercises to practice my web hacking skills. This post is about one of the interesting challenges I…Feb 14, 2021Feb 14, 2021