Category: OS and Binary

  • The Binary Exploitation: Stack based Buffer overflow

    The Binary Exploitation: Stack based Buffer overflow

    This article talks about cracking Level 13 Binary of Cyberstart CTF. The hint that was given for this challenge is “Cyclic Pattern”, which means we need to use pattern finder tool to figure out the length of the buffer and then run the arbitrary function. Let’s crack this: Running the binary gives us this output:…

  • BugCrowd’s LevelupCTF 0x07 walkthrough

    BugCrowd’s LevelupCTF 0x07 walkthrough

    LevelupCTF is a seven flag CTF. It contains vulnerabilities from information disclosures to Remote Code execution. Each flag provides hints towards the next flag. The CTF consists of wide range of challenges which provides great learning as well. Below are the vulnerabilities and their impacts that I have found: Sensitive Data Exposure – P4 Broken…

  • Ways to search files in Kali – which, locate and find

    Ways to search files in Kali – which, locate and find

    Kali is the one of the best operating system for Pentesting and hacking. After BackTrack, this is the only operating system I have used, since I think 2015.It has a lots of tools and features that will help you from information gathering to maintaining the access. This article is about Three tools that kali provides…

  • Stack Overflows for Beginners: 1 Walkthrough Level0 to Level1

    Stack Overflows for Beginners: 1 Walkthrough Level0 to Level1

    Stack Overflow for Beginners: 1 is the overflow based machine. We have to exploit the Binaries in order to get to the next level. These binaries are owned by user who is a level above.

  • VirtualBox NAT settings: How to configure so they don’t have same IPs?

    VirtualBox NAT settings: How to configure so they don’t have same IPs?

    I am writing this article because I have been through a configuration problem while setting up NAT network in VirtualBox. The problem: Both my machines getting the same IP addresses after selecting NAT as the network for both. I just start using VirtualBox, I used to use VMware. To solve this problem, follow these steps:…

  • Part 2: Finding the IP address of your Victim in your VMware Hacking Lab Network

    Part 2: Finding the IP address of your Victim in your VMware Hacking Lab Network

    This article is the continuation of Part 1 which is for the virtualbox. In case, you have missed it, here is the link: http://www.anonhack.in/2018/06/finding-the-ip-address-of-your-victim-in-your-hacking-lab-network/. This article will help you find the IP address if you use VMware instead of VirtualBox. The commands are same and so does everything but just VMware. Requirements: Kali OS [You can…

  • Part 1: Finding the IP address of your Victim in your VirtualBox Hacking Lab Network

    Part 1: Finding the IP address of your Victim in your VirtualBox Hacking Lab Network

    This article will give you ways to find the ip address of the vulnerable /victim machine in your hacking lab environment in your network. A reader of my blog recently asked me to write about CTF challenges from very basics. I am really glad to get a suggestion. So, here is what you asked for.…

  • Recovery guide for windows Laptop for Blue Screen of Death

    Recovery guide for windows Laptop for Blue Screen of Death

    This article is a recovering guide for when you can’t start windows and can’t recover the important files. I have this problem for a while now. My laptop had windows 8 installed in it. I did not upgrade it to windows 10 and stayed with windows 8.1 up-gradation. After sometime, I have been seeing blue…

  • BIOS settings to run Bootable LIVE USB

    BIOS settings to run Bootable LIVE USB

    This is a guide to change the BIOS settings to boot your live USB. The BIOS stands for Basic Input output system, which defines the basic settings for hardware that is used for initial boot up settings of the device. It defines from where the OS will boot first, also the virtualization capabilities can be…

  • Creating Bootable LIVE USB using win32DiskImager

    Creating Bootable LIVE USB using win32DiskImager

    Win32DiskImager can be downloaded from https://sourceforge.net/projects/win32diskimager/. Win32DiskImager is a wonderful tool to create a LIVE bootable USB Flashdrive. It is freely available for download. Win32DiskImager is similar to unetbootin but it is more reliable. It works great with any Operating system. In case you haven’t checked my last post for unetbootin you can visit here. Creating…

  • Creating a Bootable LIVE USB flash drive using Unetbootin on Windows

    Creating a Bootable LIVE USB flash drive using Unetbootin on Windows

    Bootable LIVE USB stick will help you run any Operating System on your PC. The Privileges will not be much but it will still give help you in a lot of ways. The Bootable USB drives is created with the help of normal USB drives. Depending on the operating system, you can use 4 GB…

  • Password Reset in Ubuntu

    Ubuntu is an open source operating system based on Linux. In case you have lost your ubuntu password, this article is going to help you to recover the password and get access to your ubuntu system back. For more information visit, http://www.ubuntu.com/about/about-ubuntu Follow the below steps to recover ubuntu password: Turn on you Ubuntu as soon…