Here is a thread of my most interesting ideas:
Is there a way of creating an AI robot that can do malware analysis, right from the beginning to the end?
Well AI is not my speciality, then perhaps you will help me
But anyway, moving on swiftly:
By now you already know I like poems, so here you go
In a world of noise and chatter
We see the tweets of birds that chatter
But one tweet holds the key
To something more than plain old glee
It holds a secret, hidden in plain sight
A riddle that we need to solve tonight
But deciphering the clue won't be hard
We can do it with ease, no need to be on guard
The message is a code, a path to follow
The key to the future and tomorrow
And here's the key, second flag
cDNyZjNjdHIwMHR7VFcxVFQzUl8wUzFOVF8xNV9QUjNUVFlfMU5UM1IzU1QxTkd9
So study up and take a chance
A key to the future and the way ahead
We must find this riddle before we're dead
Let's go, friends, with no fear
And find the secret waiting there!
If you found this on twitter or maybe somewhere else I don't know, well congratulations.
We Just getting started anyway. Goodluck with the rest of them, coz you need it trust me :)
Hello, this is my approach for solving cyberdefenders challenge for maldoc101 which can be found here Solving the challenge We'll follow the questions for us to solve it. Disclaimer: Please it's better to first solve the challenge first before solving it since it will have some spoliers. Challenge details
Dec 21, 2022I recently stumbled across some challenges that were done sometime back this year organized by Mandiant. The challenges were in sort of CTF in which you had to find the flags. I got the challenges in my github page if you want to explore them. Challenge 1 - flaredle For the first challenge flaredle we are given some files that look they are a webpage. So we were given a link for which to access the challenge which can be found here When we get into the webpage we see some sort of word puzzle. The puzzle requires 21 characters, so we can try to input some random alphabets to see what it does.
Dec 7, 2022Hello. This is a writeup for the bof challenge(binary exploitation) in pwnable site and can be found here Let's go :wink: Solving The Challenge The challenge has 2 files which we can download. We first run strings to see if anything is there. And we find nothing. Since we are given the source code, we investigate it, to see what we can find. We see it uses a dangerous function gets which does not check for the buffer overflow. For more info, you can use man gets to see how it works.
Dec 1, 2022Hello, This is a writeup for TryHackMe room Dear QA Let's dive into it. Task 1 Binary download Download the task binary so that we can analyze it locally. Task 2 Challenge Flag On downloading it, we can run file to see what we are dealing with. we run strings to see if we can find anyhting there.
Nov 15, 2022or
By clicking below, you agree to our terms of service.
New to HackMD? Sign up