troy@home:~$

  • Malware Analysis Fundamentals: A Guide to the PE File Format

    Introduction Before getting started in malware analysis, it is important to first understand the fundamentals. In this post, we will explore one of those fundamentals: the PE File format. Much of the Windows-based malware that we come across today, whether in the form of.exe or .dll files, will be of...

  • CTF Writeup: tryhackme.com Startup

    Introduction Let’s do another capture the flag machine on tryhackme.com. Today we will do the Startup machine located here. The introduction for this machine reads: We are Spice Hut, a new startup company that just made it big! We offer a variety of spices and club sandwiches (in case you...

  • Know Your Encodings: Roll your own Base64 encoder

    Introduction Most of us will recognize Base64 when we see it. But how familiar are you with it really? Do you know how it works? In this post we will take a deep dive into Base64 and how it is used to encode data. I think that one of the...

  • CTF Writeup: tryhackme.com Skynet

    Introduction Once again, I will do a tryhackme.com capture the flag writeup. This time we will take a look at the Skynet room. The introduction to this room simply states: Are you able to compromise this Terminator themed machine? In addition to obtaining the usual user and root flags, we...