5 articles
A walkthrough of the HackTheBox Conversor machine demonstrating XSLT injection for arbitrary file write, cron-based code execution, and privilege escalation through CVE-2024-48990 needrestart exploitation.
A walkthrough of the HackTheBox Cap machine demonstrating IDOR vulnerabilities, cleartext credential capture, and privilege escalation through Python setuid exploitation.
A deep dive into how memory actually works—from registers and assembly to stack frames, heap allocation, and the security implications of manual memory management.
Understanding C types, from the chaos of architecture-dependent sizes to strings, arrays, and the security implications of working with raw memory.
A no-nonsense guide to learning C the hard way—covering tooling, compilation, debugging, and what it really takes to understand systems programming.