I leveraged the Parrot OS, a highly respected and versatile operating system, to tackle various challenges on platforms such as TryHackMe, HackTheBox, and Capture The Flag (CTF) exercises. I particularly enjoyed the Popcorn, Bashed, and Forest challenges on HackTheBox. To analyze and resolve these challenges, I utilized a range of tools, including Ida Pro, x64dbg, LARA, Cheat Engine, Cutter, Radare2, exDnSpy, and Ghidra, which allowed me to hone my skills in assembly language on multiple architectures, including arm, x64, and x86. These tools enabled me to thoroughly explore and dissect malware, further enhancing my skills in reverse engineering and problem-solving, all within the context of cyber security.
Ala GARBAA’s Post
More Relevant Posts
-
PCU Insight: New GhostRace Vulnerability Alert! Researchers uncover a critical data leakage flaw, GhostRace (CVE-2024-2193), stemming from speculative execution in modern CPUs. This complex twist on the Spectre v1 vulnerability leverages speculative execution and race conditions, posing a risk across multiple architectures. GhostRace showcases how attackers could exploit Speculative Race Conditions (SRCs) to access privileged data, challenging our current understanding of CPU security. The discovery calls for heightened vigilance and an update of synchronization practices to protect sensitive information. Stay ahead of evolving cyber threats. For insights on safeguarding your systems against such sophisticated vulnerabilities, connect with us at ProCheckUp. Let's fortify your defences together. #GhostRace #Cybersecurity #SpeculativeExecution #CPUVulnerability #ProCheckUp
To view or add a comment, sign in
-
Founder & CEO at Hacker Associate | Black Hat Hacker | Offensive Penetration Testing Services | Cloud Security | Speaker | Cyber Security Consultant | Researcher | Mentor
𝐕𝐢𝐝𝐞𝐨: 🔑 𝐓𝐨𝐩 5 𝐓𝐨𝐨𝐥𝐬 for 𝐀𝐜𝐭𝐢𝐯𝐞 𝐃𝐢𝐫𝐞𝐜𝐭𝐨𝐫𝐲 𝐄𝐱𝐩𝐥𝐨𝐢𝐭𝐚𝐭𝐢𝐨𝐧 🔍 Harshad Shah 🔍 Looking for the 𝐁𝐞𝐬𝐭 𝐓𝐨𝐨𝐥𝐬 𝐭𝐨 𝐄𝐱𝐩𝐥𝐨𝐢𝐭 𝐀𝐜𝐭𝐢𝐯𝐞 𝐃𝐢𝐫𝐞𝐜𝐭𝐨𝐫𝐲? 🤔 Hacker Associate 💪 We've Got You Covered with 𝐎𝐮𝐫 𝐓𝐨𝐩 5 𝐏𝐢𝐜𝐤𝐬! 🎉 🔒𝐓𝐮𝐧𝐞 𝐢𝐧 𝐚𝐧𝐝 𝐥𝐞𝐯𝐞𝐥 𝐮𝐩 𝐲𝐨𝐮𝐫 𝐤𝐧𝐨𝐰𝐥𝐞𝐝𝐠𝐞! 𝐅𝐨𝐥𝐥𝐨𝐰 𝐮𝐬 𝐟𝐨𝐫 𝐭𝐡𝐞 𝐟𝐨𝐥𝐥𝐨𝐰𝐢𝐧𝐠: - Car Hacking - GSM Hacking - SDR for Pentester - HACKRF - Hardware Hacking etc. - Black Hat Hacking - Satellite Hacking
To view or add a comment, sign in
-
🚀 Task 2 Completed: Pixel Manipulation for Image Encryption 🚀 I’m excited to share that I’ve completed Task 2 at Prodigy Info Tech! 🎉 🔒 Project: Developed a simple image encryption tool using pixel manipulation techniques. This involved operations such as swapping pixel values and applying basic mathematical transformations to each pixel. Prodigy InfoTech#ImageEncryption #PixelManipulation #TechInnovation #ProdigyInfoTech #LearningJourney #CyberSecurity
To view or add a comment, sign in
-
Ethical hacker | red teamer | CTF player | computer geek | jr penetration tester | CEH...in progress |Ejpt....in..progress
here is my writtup about introduction to printer hacking from HTB https://lnkd.in/dzVMAuYP JULIUS SORAELY David Felix
To view or add a comment, sign in
-
Hardware hacking: Wireless doorbell payload harvesting Cybersecurity from the offensive perspective is not only related to web-applications and Active directory attacks. There are a lot of hacking areas beside mentioned ones: mobile, API, operational technology (OT), and wireless attack simulations; binary exploitation, social engineering, red teaming and many more other. One of the toughest one, from my point of view, is hardware hacking, when you are communicating directly with the layer 1 of OSI model – physical. If you are excited as much as I am to disassemble some devices – let’s not waste any second and dig into learning together - let's hack the wireless doorbell😉 Article link -> https://lnkd.in/dahZbrFT Hashtags -> #hardware #hacking #doorbell #hardwarehacking #raspberry
To view or add a comment, sign in
-
A groundbreaking side-channel attack method that poses a risk of #dataleakage has been unveiled, targeting nearly all modern CPUs. Conducted by an esteemed group of eight researchers representing Technische Universität Graz in Austria and CISPA Helmholtz Center for Information Security in Germany, this cutting-edge research team includes experts who previously discovered the infamous Spectre and Meltdown vulnerabilities, along with several other side-channel attack methods. Dubbed Collide Power, the newly identified attack exhibits similarities to the notorious Meltdown and Microarchitectural Data Sampling (MDS) vulnerabilities. While this discovery raises concerns, rest assured that the #cybersecurity community is actively working on preemptive measures. Check out the link to the full article in the comment section. #cyberdefense #techfacts #datasecurity
To view or add a comment, sign in
-
Day - 5 of Advent of Cyber 2023 by TryHackMe Today was all about reverse engineering. I gained some new interesting information about the DOS (Disk Operating System), filesystem, and magic bytes in data recovery and file system analysis. Key learnings: 1. Explored an unfamiliar legacy system. 2. Discovered DOS and its connection to its contemporary, the Windows Command Prompt. 3. Explored file signatures and magic bytes in data recovery and file system analysis #cybersecurity #cybersecuritytraining #tryhackme #cybersecurityjobs #reverseengineering #ethicalhacking #ethicalhacker #ethicalhackingtraining #ethicalhackers
To view or add a comment, sign in
-
Chapter 37: Hacking Functions, w/o Param, w/o Return 📷 Hack at the Assembler level and learn to understand how functions w/o params and w/o return work in memory as we reverse engineer an embedded binary! #CyberSecurity #Embedded #Development #ReverseEngineering https://lnkd.in/enM_-gnM
To view or add a comment, sign in
More from this author
-
Navigating the Diverse Landscape of Design Careers: A Comprehensive Overview
Ala GARBAA 4mo -
🌐📊Naviguer dans le terrain complexe de la conception de l'information : Une perspective multifacette
Ala GARBAA 4mo -
🌐📊Navigating the Complex Terrain of Information Design: A Multifaceted Perspective
Ala GARBAA 4mo