A writeup of the retired HackTheBox machine 'Valentine'.
ReadA writeup of the retired HackTheBox machine 'Networked'.
ReadWhile reading UNIX source code, I became curious about the process of transitioning to protected mode during boot, so I've compiled my findings.
ReadThis article summarizes the overview of GOT and PLT and presents practical verification results.
ReadThis article summarizes issues that occurred when making XRDP connections to Ubuntu machines.
ReadA writeup of the retired HackTheBox machine 'BountyHunter'.
ReadThis is a writeup of the retired HackTheBox machine "Validation".
ReadI decided to rebuild my ParrotOS environment, which I use for Hack The Box and CTFs, so I wrote this article as a memo on the setup procedure.
ReadA writeup of the retired HackTheBox machine 'Mirai', covering IoT malware attack techniques and defenses.
ReadI decided to rebuild the ParrotOS environment I use for Hack The Box and CTFs, so I wrote this article to summarize the setup steps as a personal memo.
Read