Why does zsteg not work on JPEG files?
If youβve been playing CTFs for some time like me, you would be somewhat familiar with what Steganography is (or at least know what hail mary stego tools to throw image files at to hopefully obtain...
If youβve been playing CTFs for some time like me, you would be somewhat familiar with what Steganography is (or at least know what hail mary stego tools to throw image files at to hopefully obtain...
The annual Flare-On has just concluded recently and I did not manage to find enough time to finish the final challenge. Regardless, here is a brief writeup for challenge 8 FlareAuthentiactor to sho...
I was writing a forensics CTF challenge for a CTF organized by ISC2 SG Youth Wing and I wanted to write a challenge where the participants had to decrypt some HTTPS traffic with a SSLKEYLOGFILE to ...
Iβve always had much appreciation for all the low-level things from assembly to compilers and more. In my pursuit to better understand these mechanisms, Iβm often left with many questions on what...
At this yearβs DEFCON, I participated in the Red Team Village CTF as NUSeXcel (a collaboration between NUS Greyhats and HTX) and we managed to take first place and also win a DEFCON Black Badge! Th...
Summary This research will dive into how symbol resolution works (in ELF), and how common tooling such as decompilers and disassemblers parses the symbol resolution metadata to identify imported/l...
This year, I participated as NUS Greyhats in the DSTAβs BrainHack CDDC University Category and we came out first place once again βοΈ nus greyhats at cddc! Check out the full list of challenges &...
9 months after my last hardware venture playing around with the Off-By-One Conference Badge, I once again find myself intrigued with yet another conference badge. Although I was initially hesitant...
Foreword The Flare-On Challenge is a single-player series of Reverse Engineering challenges, some of which are inspired from real-world problems faced by the mandiant team during their malware ...
On Windows, the operating system implements its own unique exception handling mechanisms β Structured Exception Handling (SEH) and Vectored Exception Handling (VEH) β which is an extension on top...