Reversing Challenge: Snake HTB

To solve this quickly please look at the method stated at the bottom of the page. Firstly we download the zip from htb and unzip this to obtain the file we will be reversing ‘’. I will be completing this challenge using kali linux x64 but it should be very similar on any OS with... Continue Reading →

Practical Malware Analysis Chapter 3

Chapter 3Lab 3-1 Let me start  by saying this chapter is just awesome. To be good at anything you need to know how to use the tools that can make you good and that is exactly what this chapter helps you understand. Unfortunately, I read the chapter about a week before attempting the lab and... Continue Reading →

SMS/Text Spam Script

A friend of mine came to me in urgent need of annoying someone. This was an easy “yes” for me. Having the victims phone number we thought spamming the hell out of their phone would be interesting. I found many programs that would send texts via interface and or simple programs. What I could not... Continue Reading →

Programming From The Ground Up Chapter 4

Chapter 4 Know the Concepts 1) What are primitives? Primitives are the basics which everything else is built off of. These are operations provided by the system as you simply would not be able to write certain functions without primitives. 2) What are calling conventions? Calling conventions describe how functions expect to get and receive... Continue Reading →

Poison HackTheBox Notes

As I continue to post my notes for retired boxes you will likely notice a drastic increase in detail. A few boxes were completed when I was just getting into cyber security and since then I have learned a lot in regards to documentation. Simply based off of the name here we can determine this... Continue Reading →

Celestial HackTheBox Notes

This box isn’t too bad and was actually pretty educational. First we started off with an nmap scan, noticing only one port open “3000”. Using the flag -sV we can use banner grabbing to determine what service is running on the port. We then found out it was node.js and a web host. So we... Continue Reading →

Programming From The Ground Up Chapter 2

Chapter 2: Know The Concepts 1) Describe the fetch-execute cycle. Also known as an instruction cycle or fetch-decode-execute cycle is the basic operational process of a computer. The process consists of the computer retrieving a program instruction from its memory; it then determines what actions the instruction contains. Lastly, it will execute the cycle. The... Continue Reading →

Create a website or blog at

Up ↑