Hi, I'm Paul.

Hacker

Threat intelligence analyst, security enthusiast and constant learner.

Read about me
Artik Blue's Picture

Reverse engineering x64 binaries with Radare2 - 16 - II (more sockets, http emulation, radasm, ragg and shellcode)

Performing get requests with UNIX sockets Sockets are the very fundamentals of networking in any operating system. You ca...

Operational security techniques in asymmetric conflicts - II (device acquisitions)

Secure device acquisitions It is very important to remark that our first interaction with the device and therefore the or...

Reverse engineering x64 binaries with Radare2 - 16 (unix sockets fundamentals)

Today we’ll talk about sockets, fundamental stuff on computer progams and used by many malware and exploits. We’ll start f...

Anonymous and the rise of 'hacktivism' as a collective action phenomenon

Abstract This paper seeks to reflect on the role of groups of individuals with remarkable technical skills and a particul...

Operational security techniques in asymmetric conflicts - I (threat modeling)

About asymmetric conflicts According to WikiPedia: Asymmetric warfare (or asymmetric engagement) is war between belliger...

Reverse engineering x64 binaries with Radare2 - 15 (Windows fundamentals; Intro to WinApi and file management)

Today we are going to talk about the windows api, something that will allow us to do similar stuff as what we are doing wi...

Reverse engineering x64 binaries with Radare2 - 14 - I (linux systems programming; theory, syscalls, files and ESIL)

What’s up family, today we are going one step further in reversing. From our fist reversing tutorial untill now, we saw th...

Reverse engineering 32 and 64 bits binaries with Radare2 - 13 (defines, unions and bitmaps)

Today we are gonna get a bit low level. We’ll review important stuff like unions bitmaps and defines, that are commonly us...

Reverse engineering 32 and 64 bits binaries with Radare2 - 12 (linked lists, enums, bitwise operations and r2pipe)

Hello everybody! We are about to end this first part of the course, aren’t you excited? I’m sure you are. Today we will ...