-
Reenterency Attack In Erc1155 Nft Protocol
Attacking ERC1155’s _mint function through ReEnterency Hi Most of you heard of Ethereum Blockchain and NFT(Non-fungible Token). In terms of implementing a NFT on Ethereum Blockchain using Solidity language, there are two well defined and popular standards i.e ERC721 and ERC1155 We will be working on ERC1155 standard, implementing by...
-
Craking Linux Password Hashes
Hi In this blog , I want to discuss, how to crack password hashes of Linux users? Like any username - password system , Linux don’t save password as plain text. Instead It stores password hashes. Every time you entered user password to login , it generates it’s hash and...
-
Reverse Engineering A Binary File Beginners
Hi everyone!! In this blog i will discuss the basic of reverse engineering of a binary file in linux. The binary file is output of compilation of a c program using GCC compiler in 64bit Kali Linux. Binary file can be find here. This file will be run on a...
-
Exploit Format String Vulnerability In Printf() Funtion Of C
Hi this is Gurdeep, In this blog I want to discuss a vulnerability in c/c++ printf() which i encountered recently while playing a CTF. Let’s start this without wasting time. So in this challenge we had 2 files rot26 and rot26.c . rot26 file is linux 32-bit executable file and...
-
Enhance Python Code With C: Cython
Are you a python developer? Have you ever witness slow execution of your python code? Have you ever wonder why numpy , pandas and similar packages are fast? If answers of above question is Yes, then you come at right place. Python is one of most popular programming language at...