A Look at AFL++ Under The Hood
A Look at AFL++ Under The Hood How this post is structured The objective of this post is to allow anyone to gain an understanding of AFL at the level they want. I want to cover AFL at both a usage level and an internals level. At the end of this article, there are In-Depth sections that cover AFL in even more depth. One additional note. In the code snippets, I often use ....
Reversing Macos Malware (Tinyshell)
In my little journey of learning about macOS/Apple security, I will be documenting things I have learned via blogpost. This might not be useful to most researches since they probably know more about this topic but this should be a good resource for other beginners in this field. For the first post, I will document my step in reversing a simple yet interesting malware, TinyShell. It’s important to not, I used Mitten Mac’s post as a reference....
Creating an IPTables Backdoor
Introduction For my project, I chose the ambitious goal of adding a backdoor to Linux’s iptables firewall. In order to do this, I had to delve deep into the Linux kernel and study the inner workings of the networking stack. Through my efforts, I was able to make iptables accept specially-crafted packets, even if the user-defined rules say otherwise. The Evil Bit In April 2003, the Internet Engineering Task Force published RFC3514, which defines a previously-unused bit of the IPv4 fragment offset field as the “evil bit” or security flag....
Welcome to the RITSEC Blog!
WELCOME TO THE RITSEC BLOG!