To solve this quickly please look at the method stated at the bottom of the page. Firstly we download the zip from htb and unzip this to obtain the file we will be reversing ‘snake.py’. I will be completing this challenge using kali linux x64 but it should be very similar on any OS with... Continue Reading →
Practical Malware Analysis Chapter 3
Chapter 3Lab 3-1 Let me start by saying this chapter is just awesome. To be good at anything you need to know how to use the tools that can make you good and that is exactly what this chapter helps you understand. Unfortunately, I read the chapter about a week before attempting the lab and... Continue Reading →
Practical Malware Analysis Chapter 1
Chapter 1 LAB 1-1 1. Upload the files to http://www.VirusTotal.com/ and view the reports. Does either file match any existing antivirus signatures? Looking at each of these files should be a clear indicator to people that these files are not safe. 2. When were these files compiled? in PEview we found the DLL to have... Continue Reading →
SMS/Text Spam Script
A friend of mine came to me in urgent need of annoying someone. This was an easy “yes” for me. Having the victims phone number we thought spamming the hell out of their phone would be interesting. I found many programs that would send texts via interface and or simple programs. What I could not... Continue Reading →
Programming From The Ground Up Chapter 4
Chapter 4 Know the Concepts 1) What are primitives? Primitives are the basics which everything else is built off of. These are operations provided by the system as you simply would not be able to write certain functions without primitives. 2) What are calling conventions? Calling conventions describe how functions expect to get and receive... Continue Reading →
Programming From The Ground Up Chapter 3
Chapter 3: Know The Concepts 1) What does if mean if a line in the program starts with the ’#’ character? The ‘#’ character declares the line or the remainder of the line as a comment. This line will not change the program in any way. Comments are extremely helpful for programmers as it allows... Continue Reading →
HTB:”Find The Easy Pass” using Immunity
Recently I’ve been reading Programming from the Ground Up by Jonathan Bartlett to begin my journey into reverse engineering and malware analysis. After spending a bit of time on this book I was very interested in seeing my new knowledge at work. So I took to hackthebox and found the perfect task. Under Reversing I... Continue Reading →
Poison HackTheBox Notes
As I continue to post my notes for retired boxes you will likely notice a drastic increase in detail. A few boxes were completed when I was just getting into cyber security and since then I have learned a lot in regards to documentation. Simply based off of the name here we can determine this... Continue Reading →
Celestial HackTheBox Notes
This box isn’t too bad and was actually pretty educational. First we started off with an nmap scan, noticing only one port open “3000”. Using the flag -sV we can use banner grabbing to determine what service is running on the port. We then found out it was node.js and a web host. So we... Continue Reading →
Programming From The Ground Up Chapter 2
Chapter 2: Know The Concepts 1) Describe the fetch-execute cycle. Also known as an instruction cycle or fetch-decode-execute cycle is the basic operational process of a computer. The process consists of the computer retrieving a program instruction from its memory; it then determines what actions the instruction contains. Lastly, it will execute the cycle. The... Continue Reading →