A good shell environment is quite important for completing various tasks. In Linux most of the advanced commands, scripts are done in a shell environment. I have searched for a good terminal so that I can perform various activities with ease. After considering various terminals like Terminator[1], Tmux[2] and others, I have final found the tool I was looking for. Tilix [3] had most of the features I was looking for like hot key assignment of various commands and it had a very flexible user interface so that I can start with a minimal but make a complex by adding more tabs or splitting the terminals into various window.

Continue reading

There is requirement that we need to perform database analysis on invalid entires into the database. We need to trace or track the entries performed in the database. But to do that we need a proper way to do it. how to test In this guide we will make a test database in called Tweety in Microsoft SQL Server 2017 and connect to it using Microsoft SQL Server Management Studio.

Continue reading

Follina exploit

In this tutorial we will go through the very easy to exploit Follina (CVE-2022-30190) which can be used to perform command execution. This is a easy to build exploit as command can be executed on the remote system witout any promot. As this exploit does not require any macro for exploit, and the complexity of the development is easy, attackers can easily use this to enter enterprise network via email and opening the file using Microsoft Office.

Continue reading

prohibited mnemonics

In this guide we will try to explore if we can check for any mnemonics which we don’t want the CPU to execute. In the below example, we will try to block some specific commands from being executed in the CPU. The challenge is to convert rawbytes to assembly language again and check for prohibited mnemonics. code # prohibit command # the objective is to block certain commands from qiling import Qiling from qiling.

Continue reading

basic execution of qiling

In this segment we will take a sample code from the how to and try to execute according to our own. In this test, we will try to perform an simple addition and see how it goes. The below tutorial will be a very basic entry into the qiling framework where we will perform a simple addition. addition To perform the addition, following code will be executed onto the CPU.

Continue reading

push and search data

In this part, we will try to push a value on to the stack and will try to read it. We will assembly code mov eax, 0xdead mov ebx, 0xbeef push eax push ebx We get the below raw bytes (there are various websites from which you can do this, if you do not know how to generate the raw bytes.): B8ADDE0000BBEFBE00005053 Now we will try to execute the code below and try to read the values found in the register:

Continue reading

set registers using python

In this section we will use another code to push and set various variable into the emulator prior running the code and set appropriate registers and stack so that we can simulate the code. In the previous writeup, we have used rar bytes code from the In this segment we will just add values for a predefined value in eax and ebx. The below segment uses asmmethod found from pwntools .

Continue reading

Author's picture

rezaur rahman

just thinking out loud to help others

cybersecurity researcher