I need a holiday. WTF am I doing here now? 4AM in the morning, mindlessly staring at a computer screen, tricking myself into thinking I’m actually learning something. I should probably go for a run(?) or learn to play an instrument(??) or probably just sleep like normal people do(???). No,... [Read More]
Welcome to my blog! My name is last and here I write about my learning journey through the wonderful (and sometimes scary) world of cyber security. Feel free to stick around, nothing here is really too complex to understand (if I learnt it, you surely can too). If you want to contact me, head to the about me page where you will find my e-mail address and Twitter profile. Anyway, check out my blog posts down here.
Introduction to angr Part 2.1
Same shit, other day?
I told you in the last post we would have tested angr on a reverse engineering challenge different from the ones we’ve seen so far in angr_ctf. Since I’m a lamer lazy person I did not want to completely reanalyze a new binary so I went for the one we... [Read More]
Introduction to angr Part 2
Jarvis, sometimes you gotta run before you can walk
Searching on Google how to combat writer’s block and blank page fear? Check. I really don’t know how to start this time, probably because I’m distracted so let’s dive right into it. [Read More]
Introduction to angr Part 1
You need to learn to walk before you can run
In the zeroth part of this series we learnt how to perform some very basic symbolic execution of a simple binary. This time we are going to talk about symbolic bitvectors and how to avoid unwanted states to reduce execution times. [Read More]
Introduction to angr Part 0
Baby steps in symbolic execution
I need a holiday. I definetely need one. But what’s the point in going on vacation if you never learned how to use angr in a CTF? Wait, you are telling me this is not a reason not to go on vacation? Well, too bad, you should’ve told me before... [Read More]