by InCIDRthreat | Jan 15, 2023 | blog
Are you interested in learning how to code and need a few reasons to convince yourself? Then you’ve come to the right place! Programming is a valuable skill that can open up a world of opportunities, whether you’re looking to build your own apps or...
by 4p0cryph0n | Jan 2, 2020 | hacking
Welcome back! In the last level, we covered narnia3, which was a good play with buffer overflows and file permissions. Now that we’ve successfully owned narnia3, let’s move on to narnia4. Introduction /* This program is free software; you can redistribute it and/or...
by InCIDRthreat | Apr 29, 2019 | hacking, tutorials
Welcome back! Now that we’ve conquered Level 2 and gained the password for Level 3 it’s time to keep pressing. Introduction Same thing from before. Log into the lab server as Narnia3 and look at the source code for narnia3.c. /* This program is free...
by InCIDRthreat | Apr 24, 2019 | hacking, tutorials
Introduction In the previous write up the environment variable was set to the exploit payload granting an escalated shell. This challenge is different however, it will be building upon the theme of binary analysis. Getting Started Once logged into the Narnia server as...
by InCIDRthreat | Feb 20, 2019 | hacking, tutorials
Introduction Narnia a series of reverse engineering puzzles developed by OverTheWire and is an introduction to reverse engineering. Below is the methodology used to solve these puzzles. Login and Execution In the previous level, Narnia 0, we covered the difference...
by phantasmthewhite | Feb 1, 2019 | hacking
Easy tutorial about hacking our first MIFAR/RFID Tag. RFID is a technology widely used in our lives, from our building access badges, to payment facilities, or even our gates’ remotes. As we’ve seen in the previous post here, some of them are utilizing little to no...
by phantasmthewhite | Jan 22, 2019 | hacking
Hacking MIFARE & RFID As we start this series, you won’t find anything that hasn’t already been discussed before. This is not a new topic, but rather my own vision of the many different things that’ve been done concerning RFID. Other Proof of Concepts...
by InCIDRthreat | Dec 31, 2018 | blog
Before we get into it… Let’s start this off the right way. Thank you readers, community contributors, and supporters! We say this every year and each year it means more to us than you will know. As the Information Security community continues to grow, we...
by InCIDRthreat | Dec 28, 2018 | blog, hacking, security
Whether you’re in a small business or in a multi-million dollar company, you’d surely want to fortify and maintain your networks physical and IP security by having penetration testing. There may be a lot of pentest companies and professionals out there, but hiring...