Profile cover photo
Profile photo
Nipun Jaswal
52 followers -
Author & Cyber Security Expert
Author & Cyber Security Expert

52 followers
About
Posts

Post has attachment
Subjects that Help Building Cyber Security Skills while you are Studying - Whats up guys eh, long time and i haven't posted anything recently. Yeah i know i have been busy with a ton of work at the company where we have been doing something amazing almost every day. Recently, we have been working on various cutting-edge vulnerability research and product development projects and my end of the day is like never-ending. Anyways, there have been many students asking me one common question every time i login to facebook or any other social media that "I am a B.tech/BCA/MCA/B. Sc IT student and to focus more on cybersecurity, which subjects i should focus on". Well, your parents would say every subject :P, but some of the subjects do stand out from the crowd. Like i have always mentioned in my previous talks, articles that C is the mother of all programming languages, you should always keep C in the prime focus when it comes to programming. For those who suck at C or programming entirely, i am afraid that you may become a cybersecurity professional knowing nothin
Add a comment...

Post has attachment
Add a comment...

Post has attachment
Subjects that Help Building Cyber Security Skills while you are Studying
Whats up guys eh, long time and i haven't posted anything recently. Yeah i know i have been busy with a ton of work at the company where we have been doing something amazing almost every day. Recently, we have been working on various cutting-edge vulnerabil...
Add a comment...

Post has attachment
Art of Shellcoding: Basic AES Shellcode Crypter - In this post, we will design a shellcode crypter which will encrypt the shellcode and then decrypt the encrypted shellcode and run it dynamically. The libraries we will be using for encryption will be mcrypt, and the shellcode encryption schema is
Add a comment...

Post has attachment
ShellCode Crypter using AES in C
Add a comment...

Post has attachment
Art of Shellcoding: Basic AES Shellcode Crypter
In this post, we will design a shellcode crypter which will encrypt the shellcode and then decrypt the encrypted shellcode and run it dynamically. The libraries we will be using for encryption will be mcrypt , and the shellcode encryption schema isĀ Rijndael...
Add a comment...

Post has attachment
Art of Shellcoding: Polymorphic Shellcodes - Polymorphic shellcodes help defeat pattern matching. A great shellcode will combine not only the polymorphism in the shellcode but will combine a variety of techniques including encoding, encryption, and polymorphism. In this post, we will take up 3 different shellcodes and will convert them into the polymorphic ones. A polymorphic shellcode will not differ in the functionality, but we will use a variety of other instructions. This means that polymorphism is nothing but doing the same thing using a variety of different instructions./bin/cat /etc/passwd Shellcode
Add a comment...

Post has attachment
Polymorphic Shellcodes
Add a comment...

Post has attachment
Art of Shellcoding: Polymorphic Shellcodes
Polymorphic shellcodes help defeat pattern matching. A great shellcode will combine not only the polymorphism in the shellcode but will combine a variety of techniques including encoding, encryption, and polymorphism. In this post, we will take up 3 differe...
Add a comment...

Post has attachment
Art of Shellcoding: Metasploit Read File Payload Analysis - Today, we will be looking at Metasploit's linux/x86/read_file payload. In this post, we will uncover how this payload works internally when it tries to read the /etc/passwd file. We will use GDB-Peda for our analysis. Using msfvenom, i created a file, i.e., read. Elf and while i was generating the file i used PATH value as /etc/passwd.
Add a comment...
Wait while more posts are being loaded