interesting stuff

Thoughts on the Overdrive hacking conference

Written by  on April 22, 2018

During the last week, on days 18th, 19th, and 20th the third edition of Overdrive hacking conference happened in Girona, with more than 300 attendees[...]

Collect Windows malware/threat intelligence with dionaea honeypot / PeStudio

Written by  on August 17, 2017

Hi all! As I said in previous posts, recently I was in charge of the defense of a large network and I had to figure out a lot of things to build an effective[...]

Collect Linux malware/threat intelligence with cowrie honeypot

Written by  on August 16, 2017

Hi all! One of my main topics of research has always been malware analysis and when it comes to work the first thing you need is actually some malware[...]

NullByte challenge 0x01

Written by  on August 1, 2015

  #####NULL BYTE 0x01##### Codename: NB0x01 Download: Objetcive: Get to /root/proof.txt and follow the instructions. Level:[...]

Writing exploits with an egghunter – part 1

Written by  on August 1, 2015

Today we’ll be studying the winam 6.12 playlist buffer overflow vuln. I found that vuln very interesting to study as it requieres an important amount[...]