Hi, I'm Paul.

Hacker

Threat intelligence analyst, security enthusiast and constant learner.

Read about me
Artik Blue's Picture

Reverse engineering x64 binaries with Radare2 - Bypasssing DEP with simple ROP Chains

Hello again my dear friends. And congratulations if you got as far as here, it’s been more than 20 tutorials so far and we...

Reverse engineering x64 binaries with Radare2 - Exploiting basic Buffer Overflows

And after a very well deserved rest, here we go again. While these tutorials are generally aimed at developing skills in r...

Generating contextual geographic intelligence with shodan

About shodan Shodan.io is the world known search engine that is continously indexing ipv4/ipv6 hosts connected to the inte...

Reverse engineering x64 binaries with Radare2 - 19 (unix encrypted bind shells over TLS)

You see, it’s been a while and together we’ve learned a lot of things about the C language and it’s adventures inside the ...

Reverse engineering x64 binaries with Radare2 - 18 (Bind and reverse shells)

“Shells” Today I wanto to introduce a small and simple idea, to complement what we’ve been learning on these past posts. ...

Reverse engineering x64 binaries with Radare2 - 17 (winsock, udp C&C and file exfiltration through DNS)

Buckle up kids cause this post is going to be LONG. About Winsock In computing, the Windows Sockets API (WSA), later sho...

Reverse engineering x64 binaries with Radare2 - 16 - II (more sockets, http emulation, radasm, ragg and shellcode)

Performing get requests with UNIX sockets Sockets are the very fundamentals of networking in any operating system. You ca...

Operational security techniques in asymmetric conflicts - II (device acquisitions)

Secure device acquisitions It is very important to remark that our first interaction with the device and therefore the or...

Reverse engineering x64 binaries with Radare2 - 16 (unix sockets fundamentals)

Today we’ll talk about sockets, fundamental stuff on computer progams and used by many malware and exploits. We’ll start f...