Analyzing SureRansom - Part 1

21/01/2018 | by 0xm4v3rick | tags : vba macro

Updated based on some suggestions from Abhay. Thanks to him!!

Hello!! Long time since the last post! Although I don’t have much experience doing malware reverse engineering, I tried to play with a ransomware with my limited skill set in this area. This is the first part of this …

INS'HACK - lsEasy - PWN 75

09/04/2017 | by 0xm4v3rick | tags : pwn

I gave a try to one of the CTF events happening over the weekend - INS'HACK. This is a walk-through for one of the challenges. The challenge was pretty straight forward as I was aware of the technique to be used here, but there was small issue to sort out.

Challenge …

Code Snippets - Hex to ASCII

22/02/2017 | by 0xm4v3rick | tags : python

Hello again!
It was some time since my last post, so I decided to write a post about a simple script which I had written recently while trying to decode an attack which was thrown at me :D

Below script searches and converts each occurrence of the hex into its …

Bringing Droopy To Life

30/10/2016 | by 0xm4v3rick | tags : boot2root, vulnhub

Hi there!!!
It was time to deal with Droopy VM hosted on Vulnhub. It was interesting in many ways and made me learn some important things. Here are the things I tried to get root on the VM. My attacker kali box was set to 192.168.56.102.

Once …

Bursting the nebula | level00-level04

11/10/2016 | by 0xm4v3rick | tags : privilege escalation

This post is a walk-through for a VM from exploit-exercises called nebula. It includes some interesting privilege escalation challenges. This is the first post in the series of 4 posts that I am planning to write and involves walk-through for level00 to level04.

So let’s begin by booting up …

Page 1 / 1