troy@home:~$

  • Brute-forcing XOR encryption: tryhackme.com W1seGuy

    Introduction Today let’s take a look at the W1seGuy tryhackme.com room. This is a newly-released room that provides an easy example of brute-forcing XOR encryption when part of the cleartext is known. I really enjoyed this one so I decided to do a writeup. This writeup does not provide the...

  • Malware Analysis Fundamentals: A Guide to the PE File Format

    Introduction Before getting started in malware analysis, it is important to first understand the fundamentals. In this post, we will explore one of those fundamentals: the PE File format. Much of the Windows-based malware that we come across today, whether in the form of.exe or .dll files, will be of...

  • CTF Writeup: tryhackme.com Startup

    Introduction Let’s do another capture the flag machine on tryhackme.com. Today we will do the Startup machine located here. The introduction for this machine reads: We are Spice Hut, a new startup company that just made it big! We offer a variety of spices and club sandwiches (in case you...

  • Know Your Encodings: Roll your own Base64 encoder

    Introduction Most of us will recognize Base64 when we see it. But how familiar are you with it really? Do you know how it works? In this post we will take a deep dive into Base64 and how it is used to encode data. I think that one of the...