RITSEC Blog

Latest articles, research, and insights from the RITSEC student community

A Look at AFL++ Under The Hood

A Look at AFL++ Under The Hood How this post is structured The objective of this post is to allow anyone to gain an understanding of AFL at the level they want. I want to cover AFL at both a usage level and an internals level. At the end of this article, there are In-Depth sections that cover AFL in even more depth. One additional note. In the code snippets, I often use ....

Reversing Macos Malware (Tinyshell)

In my little journey of learning about macOS/Apple security, I will be documenting things I have learned via blogpost. This might not be useful to most researches since they probably know more about this topic but this should be a good resource for other beginners in this field. For the first post, I will document my step in reversing a simple yet interesting malware, TinyShell. It’s important to not, I used Mitten Mac’s post as a reference....

Creating an IPTables Backdoor

Introduction For my project, I chose the ambitious goal of adding a backdoor to Linux’s iptables firewall. In order to do this, I had to delve deep into the Linux kernel and study the inner workings of the networking stack. Through my efforts, I was able to make iptables accept specially-crafted packets, even if the user-defined rules say otherwise. The Evil Bit In April 2003, the Internet Engineering Task Force published RFC3514, which defines a previously-unused bit of the IPv4 fragment offset field as the “evil bit” or security flag....

April 6, 2022 · 5 min · Philomena Gray ·  Networking

Welcome to the RITSEC Blog!

WELCOME TO THE RITSEC BLOG!

March 28, 2022 · 1 min · Bradley Harker ·  README