Skip to main content

Niftic's blog

Recent

Ghidra Python3 Scripting Cheatsheet
·2 mins
Research Reverse-Engineering Ghidra
Notes on writing python3 scripts for Ghidra.
Security assessment of a commercial router using physical access: a case study
·1 min
IoT Internet of Things Router Security Trusted Computing
Physical access to a device can greatly help in vulnerability research as it opens up new vectors for exploitation.
[NorthSec CTF 2023] - Desk Surveillance Publisher
·10 mins
CTF Writeups ROP Autopwn Angr
Cameras are down. Not the endpoint installing their firmwares. Open socket here. Could analyze some outdated firmwares.
[RITSEC CTF 2023] - Steg as a Service
·10 mins
CTF Writeups ROP BinDiff
Can you try exploiting our shady copy of steghide so that we can convince our managers to update the binary?
Deep dive into FSOP
·16 mins
Research FSOP Angr
File Stream Oriented Programming (FSOP) is a binary exploitation technique that uses GLIBC file stream structures to gain code execution from memory corruption.