Hi. This would be another series of writeup where we will try to hack the tenda ac10 1200 and try to get a cve. This writeup is fairly short so lets get started While looking through the functions...
Hacking the Tenda AC10-1200 Router Part 1: CVE-2018–16334
Hi. This would be another series of writeup where we will try to hack the tenda ac10 1200 and try to get a cve. Lets get started While looking through the functions of the web server of the ac10 1...
Hacking the dlink DIR-615 for fun and no profit Part 4: Buffer Overflow
Hi. This is my 4th writeup in the hacking the dlink dir 615 series where im trying to get my first cve. Lets get stared. While looking again on all functions that accept user input, i found this i...
Hacking the dlink DIR-615 for fun and no profit Part 3: CVE-2020–10213?
Hi. This is another writeup of my hacking the dlink series. This series is just me trying to find my first cve. So let get started While going through all functions that accept user input, i found...
Hacking the dlink DIR-615 for fun and no profit Part 2: CVE-2020–10215
Hi. This is my second writeup on my hacking the dlink dir-615 series as i try to get my first cve. I found more vulns and will also make a writeup on it soon so stay tuned. So lets get started I s...
Lit CTF — Alex Fan Club : Sql injection with strict blacklist
This is my writeup on the Alex Fan Club challenge. I will show how i solved it all the way from the beginning. Lets start In the challenge, you can see that we are given a txt file and the vulnera...
Broken Access control bug : Bypassing 403’s by finding another endpoint that do the same thing.
Hi. I found a really interesting bug in my private program and i want to share it through this writeup. Lets get started. I was testing all the functionalities of this website and found this one i...
Pwnable.kr — bof : Basic buffer overflow
This is my writeup of the bof challenge from pwnable.kr . In this writeup, we will not rely on debuggers and we will not read the source code. We will just simply reverse the binary because we can ...
dostackbufferoverflowgood: buffer overflow shellcoding
Hi. This is the third writeup on my buffer overflow series. In this writeup, we will exploit buffer overflow and achieve remote code execution with shellcodes. Here, we will slightly use a debugger...
Csaw18 — get it : Buffer overflow to redirect the return flow
In this writeup, we will be solving the csaw18 get it challenge. Here, we will overwrite the return address to redirect the flow of the program to any function we want. Lets start First i opened u...