Category: Persecure
-

Practical Malware Analysis : Lab 1-2
Tools used: VirusTotal.com PEview PEiD UPX Dependency Walker Malcode Analyst Pack Questions 1. Upload the Lab01-02.exe file to http://www.VirusTotal.com/. Does it match any existing antivirus definitions? 2. Are there any indications that this file is packed or obfuscated? If so, what are these indicators? If the file is packed, unpack it if possible. The file…
-

Practical Malware Analysis : Lab 1-1
Tools used: VirusTotal.com PEview PEiD Dependency Walker Malcode Analyst Pack Questions Upload the files to http://www.VirusTotal.com/ and view the reports. Does either file match any existing antivirus signatures? 2. When were these files compiled? PEview 3. Are there any indications that either of these files is packed or obfuscated? If so, what are these indicators?…
-
API Testing Lab setup
Tools Burpsuite Postman mitmproxy2swagger Git Docker Go JWT Kiterunner Arjun Zaproxy Burpsuite Download jython Install Autorize in Burpsuite extender Postman Download postman sudo tar -xvzf postman-linux-x64.tar.gz -C /opt Create a postman account cd /opt mitmproxy2swagger sudo pip3 install mitmproxy2swagger Git sudo apt-get install git Docker sudo apt-get install docker sudo apt-get install docker-compose GO sudo…
-
Assembly 1
x86_64 Assembly Packages required: nasm – the Netwide Assembler, a portable 80×86 assembler ld – The GNU linker (compiler) Hello World Breakdown text db “Hello World”,10 text : name of memory address db : define bytes 10 : new line “/n” mov rax 1 : write syscall mov rdi 1 : output mov rdx :…
-
Assembly 2
x86_64 Assembly Packages required: nasm – the Netwide Assembler, a portable 80×86 assembler ld – The GNU linker (compiler) User Input Breakdown There are 4 subroutines in this program: _printText1 _getName _printText2 _printName _getName utilizes the read syscall and stores the user input The name variable has 16 bytes assigned it , a basic buffer…
-
Reverse Engineering – 0x01
Download the challenge : here Tools used : Test out the program Use gdb to disassemble Set to intel syntax and disassemble the main function. Let’s use ghidra to color code and analyze the assembly code. Let’s head back to gdb and crack the program. Set a breakpoint in the main function. A breakpoint is…
-
Reverse Engineering : I
https://www.begin.re/playground-exercises Good_Luck Dissemble in Ghidra Assembly Code Program compares user input with 6170 if (UserInput * 5 == 6170) : 6170 / 5 = 1234
-
Reverse Engineering : 3
https://crackmes.one/crackme/5c11dcaf33c5d41e58e00578 Test out the program. Use Ghidra to analyze the program local_1c = password (text = ?carcysae) local_14 = continue of password (text = k) local_12 = user’s input The function will compare the password to the user’s input. Let’s try password as easycrack.
-
FUNBOX: LUNCHBREAKER CTF
It’s a box for beginners and can be pwned in the lunch break.
-

Fowsniff CTF
Hack this machine and get the flag. There are lots of hints along the way and is perfect for beginners!
-

Python For Finance
1 – Loading Financial Data Import the following modules Set a datetime function Define a data frame and load financial data into it from Yahoo Finance Print the dataframe to show the data Show just the close column Show just the close column for a specific date You can save the data to a csv…
-

Cyber Security in the markets
Being an enthusiast and learner on cyber security and the financial markets its no stranger I gravitate towards cyber security stocks. Since my irrational investment in CISCO systems almost a decade back I decided to approach these companies with an analytical point of view. Cyber defense is vital in this era and no doubt we…






