In this post we will try to understand the memory more. From here we will be able tweak some parameters and obtain more information regarding how we can assigne values into the memory which we have allocated and then try to access them via pointer and dereference. If we lookinto the code below, we can see that we have mapped a memory location at 0x404000 and we have called it my memory.

Continue reading

qiling cheatsheet

Qiling is an advanced binary emulation framework. It can emulate various types of archs and can be used to perform advanced operations as well. Below are some of the quick commands which are needed for my tasks. python module from qiling import Qiling # import from qiling.const import QL_VERBOSE init code=b"\x90" ql = Qiling(code=code, archtype='x86', ostype='Linux', verbose=QL_VERBOSE.DISASM) register ql.arch.regs.read("EAX") # read register ql.arch.regs.write("EAX", 0xff) # write register memory ql.mem.get_mapinfo() #get memory related information ql.

Continue reading

Today we are going to solve a problem which has been given to me by my colleague. The wanted to build a infrastructure where every user can register through a portal and upload their public key. When the user tries to login to the system, OpenSSH server will execute a python script (planning to upgrade it to rust) and generate appropriate string so that that specific user can access his / her own LinuX Container (LXC).

Continue reading

A good shell environment is quite important for completing various tasks. In Linux most of the advanced commands, scripts are done in a shell environment. I have searched for a good terminal so that I can perform various activities with ease. After considering various terminals like Terminator[1], Tmux[2] and others, I have final found the tool I was looking for. Tilix [3] had most of the features I was looking for like hot key assignment of various commands and it had a very flexible user interface so that I can start with a minimal but make a complex by adding more tabs or splitting the terminals into various window.

Continue reading

There is requirement that we need to perform database analysis on invalid entires into the database. We need to trace or track the entries performed in the database. But to do that we need a proper way to do it. how to test In this guide we will make a test database in called Tweety in Microsoft SQL Server 2017 and connect to it using Microsoft SQL Server Management Studio.

Continue reading

Follina exploit

In this tutorial we will go through the very easy to exploit Follina (CVE-2022-30190) which can be used to perform command execution. This is a easy to build exploit as command can be executed on the remote system witout any promot. As this exploit does not require any macro for exploit, and the complexity of the development is easy, attackers can easily use this to enter enterprise network via email and opening the file using Microsoft Office.

Continue reading

prohibited mnemonics

In this guide we will try to explore if we can check for any mnemonics which we don’t want the CPU to execute. In the below example, we will try to block some specific commands from being executed in the CPU. The challenge is to convert rawbytes to assembly language again and check for prohibited mnemonics. code # prohibit command # the objective is to block certain commands from qiling import Qiling from qiling.

Continue reading

Author's picture

rezaur rahman

just thinking out loud to help others

cybersecurity researcher

Mars