Index

This is a sticky post. Below you can find links to all of my write-ups.

Return Oriented Programming Series

Web Exploitation

Binary Exploitation

Reverse Engineering

Capture the Flags

General Network Exploitation

Offensive Security Certified Professional (OSCP) Journey

Programs:

 

I will keep updating this post, adding more links as I add more write-ups.

First blog post

About this blog – CTF and war game write-ups, exploits, code, and news.

This blog will consist of a series of write-ups of war games and capture the flag competitions I compete in and complete. I will also be posting about some of my exploits, what I’m working on with regards to cyber security, as well as important news.

My main interest is in embedded security. However, I compete and am interested in all aspects of network security. So, expect posts covering the whole cyber security gamut.

In the coming weeks I will be posting some of my complete write-ups, as well as work in progress.

Some of the war games I have completed include:

  1. Bandit
  2. Natas
  3. Narnia
  4. Behemoth
  1. Basic
  2. Realistic
  3. Cryptography
  4. Programming
  5. Steganography
  1. Basic
  2. Realistic
  3. Programming
  4. Javascript
  5. Forensic

 

I am currently working on:

 

I will be participating with my CTF team in EkoParty 2016 and a few other CTF competitions later this year. So expect write-ups on these as well.