PwnDiary@PwnDiary·14 EkiAre you really familiar with xxd? pwndiary.com/write-ups/hitc… — by @umutoztuncÇevir English0130
PwnDiary@PwnDiary·17 AğuSometimes your own functions can be used against you! pwndiary.com/write-ups/redp… — by @umutoztuncÇevir English0130
PwnDiary@PwnDiary·8 NisReverse engineering is fun, isn't it? pwndiary.com/write-ups/cbm-… — by @umutoztuncÇevir English0130
PwnDiary@PwnDiary·8 NisYour password might be long and contain letters, digits, and symbols. However, it doesn't mean that it is impossible to crack! pwndiary.com/write-ups/spam… — by @umutoztuncÇevir English0120
PwnDiary@PwnDiary·27 KasNever underestimate the power of a one-byte! pwndiary.com/write-ups/tuct… — by @umutoztuncÇevir English0100
PwnDiary@PwnDiary·27 KasSometimes you need to combine vulnerabilities to exploit a binary file. pwndiary.com/write-ups/asis… — by @umutoztuncÇevir English0110
PwnDiary@PwnDiary·26 KasObfuscation makes neither your .NET application nor PowerShell script invincible! pwndiary.com/write-ups/kasp… — by @umutoztuncÇevir English0100
PwnDiary@PwnDiary·26 KasDid you know that you can write a shellcode with doubles? pwndiary.com/write-ups/kasp… — by @umutoztuncÇevir English0100
PwnDiary@PwnDiary·24 KasPHP can serialize and deserialize objects. Isn't it great!? pwndiary.com/write-ups/kasp… — by @umutoztuncÇevir English0220
PwnDiary@PwnDiary·29 EkiIf you don't check the boundaries well, a single byte can destroy everything! pwndiary.com/write-ups/p-w-… — by @umutoztuncÇevir English0100
PwnDiary@PwnDiary·29 EkiEven if it is not possible to control the stack and the registers, it is still possible to get a shell! pwndiary.com/write-ups/p-w-… — by @umutoztuncÇevir English0100
PwnDiary@PwnDiary·29 EkiEven babies know how to leak addresses using GOT and PLT sections. pwndiary.com/write-ups/p-w-… — by @umutoztuncÇevir English0100
PwnDiary@PwnDiary·28 EkiDid you assume using AQL would make your queries injection-free? pwndiary.com/write-ups/p-w-… — by @umutoztuncÇevir English0100
PwnDiary@PwnDiary·28 EkiPHP, JavaScript, or Python do not make it secure for you. You need to make it secure by yourself! pwndiary.com/write-ups/p-w-… — by @umutoztuncÇevir English0110
PwnDiary@PwnDiary·26 EkiWho needs a debugger... pwndiary.com/write-ups/bsid… — by @umutoztuncÇevir English0450
PwnDiary@PwnDiary·26 EkiNot all binaries start at main! pwndiary.com/write-ups/bsid… — by @umutoztuncÇevir English0110
PwnDiary@PwnDiary·26 EkiFrom the look of the flag, the author didn't expect people to get a remote shell on the server! pwndiary.com/write-ups/bsid… — by @umutoztuncÇevir English0100
PwnDiary@PwnDiary·22 EkiThings may not always be what they seem. pwndiary.com/write-ups/hitc… — by @umutoztuncÇevir English0110
PwnDiary@PwnDiary·20 EkiOne bit is enough to make a software exploitable! pwndiary.com/write-ups/hack… — by @umutoztuncÇevir English0110
PwnDiary@PwnDiary·20 EkiGood for newcomers to learn and practice. pwndiary.com/write-ups/hack… — by @umutoztuncÇevir English0100