N0ur5Binary Exploitation Part 2Previously we used a brute-force style technique to blindly solve the Binary Exploitation challenge “Jeeves” from HTB. Now we get surgical!Jul 31Jul 31
N0ur5Getting Started in Binary ExploitationLet’s use a brute force style approach to solving this buffer overflow challenge with bash and python.Jul 20Jul 20
N0ur5Log4j RCE When Remote Class File Won’t Load (Newer Java Versions- Deserialization Vector)So you might have heard of the log4j vulnerability (lol). If you’ve read the initial proof of concepts/general information that rushed out…Jan 20, 2022Jan 20, 2022
N0ur5inInfoSec Write-upsSomebody Call the Plumber, GraphQL is Leaking Again…So to quickly get everyone up to speed… GrapQL is a technology that allows for database query and manipulation via API interactions. It…Feb 27, 20211Feb 27, 20211
N0ur5inThe StartupHacking a SlackBot (That I Made)Hi All, First Medium article, woohoo! I was writing an WordPress blog independently for some time and fell off from updating it. I’ve…Feb 9, 2021Feb 9, 2021