Home
Ins1gn1a
Cancel

Understanding WPA/WPA2 Pre-Shared-Key Cracking

The few weaknesses inherent within the authentication handshake process for WPA/WPA2 PSKs have been known for a long time. This blog post does not serve anything that is new or has not been previou...

Basics: Registers, Stack, & Heap

A fundamental understanding of the basics is always worthwhile to get to grips with areas such as exploit development. Knowing how a program operates under the ‘hood’ can make this considerably eas...

Basics of GDB and Pwndbg

Using GDB and other command-line interfaces (such as Radare2) is fairly intimidating from a beginner perspective. GUI-led tools are all relatively easy to get to grips with debugging, such as EDB, ...

Injecting an XOR Encoded Shellcode Backdoor Into PE Files Automatically

As a point to further enhance my skills in Python along with an excuse for practicing exploit development the Frampton tool was built to initially provide information and basic handling of Portable...

Automated Egghunter and Shellcode Carving using WoollyMammoth

Shellcode carving is the act of using certain instructions to manipulate the program’s register values into creating our original shellcode on-the-fly within memory. The reason for using a carving ...