In the windows environment, to escalate privilege various information about the target system is needed. Unfortunately Windows systems are not as easy as Linux specially in the case of terminal and obtaining information from the shell. Everything in Windows systems seems twisted and made intentionally complex. You will have to remember a lot of tools other commands just to grab the basic informations about the system. Below I have listed down some of the commands which should help.

Continue reading

pwnable.kr -> passcode

This is bit of a simple challenge but the concept here is the very important and might be bit difficult to grasp. Here the code part is interesting as the developer in this case forgets to pass on the reference to the variable which we can weaponize and take control of the program. Without the reference or & sign the scanf function treats the variable as a pointer and tries to write information to that address where is “pointing to”.

Continue reading

rappel intro

Rappel is a wonderful for understanding the basics of assembly language. Initially assembly language is quite challenging to understand for the programmer as all these registers are quite confusing. Specially it becomes more difficult because the programmer is now limited to using only handful of variables where as in other languages, the number declaring variable appears to be unlimited. After we download and run the rappel, we can see that

Continue reading

basic gdb

Disassemble a function disassemble vuln Disassemble at address disassemble 0x400566 display set disassembly-flavor intel functions to display all the functions info func flags To view the flags, use the command below: info reg eflags breaks break at function break func stack Display stack stack view 30 rows of stack stack 30 source https://cheatography.com/superkojiman/cheat-sheets/gdb-pwndbg/

Continue reading

this site

It has been a long time since I was planning for a personal website so that I can give my two cents back to community. I have learnt so much from the community that words cannot measure it. So I hope that my small contribution will help others and they will be able to achieve great tech I have built this site using Hugo Framework. It seemed easy use and understand.

Continue reading

log4j vulnerability is a vulnerability which can have significant impact on the security of the system. It gives remote command execution on the target system which can cause significant damage on the system. This attack vector has been carried out by various threat actors and they were able to breach various servers and execute commands. It is strongly advised that system administrators update their systems as soon as possible. summary On December 10th, 2021, the National Vulnerability Database (NVD) published the CVE-2021-44228 documenting a vulnerability in the Apache log4j library Java Naming and Directory Interface (JNDI) lookup feature allowing for remote code execution by an attacker who is able to manipulate log messages.

Continue reading

Author's picture

rezaur rahman

just thinking out loud to help others

cybersecurity researcher

Mars