This is my writeup for Stonks, a Binary Exploitation puzzle put out for picoCTF 2021. This, along with many other Binary Exploitation puzzles are available at play.picoctf.org. Stonks was not worth a lot of points compared to other challenges, so I figured it would be easy. Comparatively, the highest scoring puzzle in the Binary Exploitation …
Find malware running from temporary directories using procfs.
Find masquerading processes using procfs.
Using procfs For Forensics and Incident Response.
Install evil-winrm on Ubuntu 20.04
Toggle Safe Browsing in Google Chrome.
A quick overview of triage data acquisition in the context of attack/defend CTFs.
Some post exploitation techniques using gawk.
Accessing Alternate Data Streams on VMDK Images on Linux.
Review of Malware Data Science: Attack Detection and Attribution
My review of SEKTOR7 Institute's Red Team Operator, Windows Persistence course.
Configure a git repository's origin as SSH rather than HTTPS.