zacheller@home:~/blog$

  • picoCTF 2020 Mini-Competition - Web Gauntlet SQL Injection

    In this challenge, we are linked to a login form we are meant to bypass with SQL injection. At each level the filter changes, so we have to update your injection as necessary. Round 1 - filter: or Use basic injection and comment out the rest of the line. input:...

  • Running Nmap using WSL1

    What Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Why In WSL 1, there have been...

  • TryHackMe - Intro to x86-64

    Room: Intro to x86-64 This room will look at the basic primitives of Intel’s x86-64 assembly language, and will use these primitives to understand the construction of basic programs using loops, functions and procedures. The tasks attached to this room will use the r2 reverse engineering framework. Note, this room...

  • LocoMocoSec Secure Coding Tournament

    On November 5th and 6th, I attended a virtual Hawaiian Prodcut Security Conference called LocoMocoSec. Secure Code Warrior ran a Secure Coding Tournament using their platform for the conference. Having used their “Secure Code Bootcamp” mobile app and the Training tab on their portal, I felt very prepared for the...